Analysis
-
max time kernel
187s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
5062d61927a7ee2bb7e060cc3a52543c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5062d61927a7ee2bb7e060cc3a52543c.dll
Resource
win10v2004-20231215-en
General
-
Target
5062d61927a7ee2bb7e060cc3a52543c.dll
-
Size
764KB
-
MD5
5062d61927a7ee2bb7e060cc3a52543c
-
SHA1
6e6e89a97f37118914dfc75b10c3f35dff8d9939
-
SHA256
cb00a4004ac29d049a8f20168809376865a363b0f4c60c3047fbf062067cb8c1
-
SHA512
54ae8719a53ee4fef4229b287bdde733ddc9aba9e0d31fc1a84bc547ab6c8e036eaadf2aa39850582f4b4ff9eb5375512be6ce830517e8e05724f9a11c05eeda
-
SSDEEP
12288:AzF7woIwyyt3STPQEh7MyzO1DczILCPUp5vXZbQWo4qqa0xUi5ac4Oq0O2U/7cRX:AzF7woryeQXG4O1scCPUBW2xUiQhOq0V
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Wine regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4812 regsvr32.exe -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5062d61927a7ee2bb7e060cc3a52543c.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Addobe_pdf.ExampleClass\ = "Addobe_pdf.ExampleClass" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\TypeLib\ = "{308E283B-69A8-44B8-BD22-FAA03EDFE453}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\ = "Addobe_pdf" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\TypeLib\ = "{308E283B-69A8-44B8-BD22-FAA03EDFE453}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ProxyStubClsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5062d61927a7ee2bb7e060cc3a52543c.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Addobe_pdf.ExampleClass regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Addobe_pdf.ExampleClass\Clsid\ = "{A0224752-A99A-459D-B3BF-FAD95C478719}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ = "_ExampleClass" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\TypeLib\ = "{308E283B-69A8-44B8-BD22-FAA03EDFE453}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\ = "Addobe_pdf.ExampleClass" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ = "ExampleClass" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{308E283B-69A8-44B8-BD22-FAA03EDFE453}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ = "_ExampleClass" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C91CA97E-5FF8-47D5-ADFC-2C060F948A7E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\ProgID\ = "Addobe_pdf.ExampleClass" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Addobe_pdf.ExampleClass\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0224752-A99A-459D-B3BF-FAD95C478719}\Implemented Categories regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 regsvr32.exe 4812 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3972 wrote to memory of 4812 3972 regsvr32.exe 92 PID 3972 wrote to memory of 4812 3972 regsvr32.exe 92 PID 3972 wrote to memory of 4812 3972 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5062d61927a7ee2bb7e060cc3a52543c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5062d61927a7ee2bb7e060cc3a52543c.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4812
-