Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
f943d0e4be29abc739a658ca25c068884d52f258e99e4784146770c234b9b8ce.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f943d0e4be29abc739a658ca25c068884d52f258e99e4784146770c234b9b8ce.dll
Resource
win10v2004-20231222-en
General
-
Target
f943d0e4be29abc739a658ca25c068884d52f258e99e4784146770c234b9b8ce.dll
-
Size
7.3MB
-
MD5
0bdb466b73541e13dde8618712b3e07f
-
SHA1
025445867adb479e434ab78604785116fe52a94b
-
SHA256
f943d0e4be29abc739a658ca25c068884d52f258e99e4784146770c234b9b8ce
-
SHA512
0bb2a30954881a5c07aa248865d205e15033f8dac9ddcf8247c2ec728dc424484d5a72fec5127066348d6abf008c62cdd17b5160dbd4acf253fd5c968c162e5e
-
SSDEEP
196608:MCh83PaiF5kdtoFrfuzOu+tUnNeVKKREUq:vi/ykZfuzOuVNed
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3220 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 404 3220 WerFault.exe 15 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3220 rundll32.exe 3220 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3220 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4036 wrote to memory of 3220 4036 rundll32.exe 15 PID 4036 wrote to memory of 3220 4036 rundll32.exe 15 PID 4036 wrote to memory of 3220 4036 rundll32.exe 15
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f943d0e4be29abc739a658ca25c068884d52f258e99e4784146770c234b9b8ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f943d0e4be29abc739a658ca25c068884d52f258e99e4784146770c234b9b8ce.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 9363⤵
- Program crash
PID:404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3220 -ip 32201⤵PID:2440