Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
CShell.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
CShell.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
crossfire.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
crossfire.exe
Resource
win10v2004-20240221-en
General
-
Target
CShell.dll
-
Size
4.0MB
-
MD5
2cb425cb5cf0a2d1f0d74bc1437e3cdb
-
SHA1
e9e8594788058d204d4014f781d8262dc9a79971
-
SHA256
c050a812f9e5d0d42fde7cc2d7996c634c0496d726a4cd4edf372d5d5610244d
-
SHA512
fc668c0d1a1428b76d2578c25eb062c5a0eeb44f27065d6f595a468c5c855ca8a4474ca1d5ca0226acea3090df8d402ef31d9604f06d692ef944af98ee06f095
-
SSDEEP
98304:y9n1MEszUnUruxXm8lDNMZXK3wBUu59xhGcK:pTUUr0mvMbu5PhG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4068 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4068 rundll32.exe 4068 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4068 1800 rundll32.exe 84 PID 1800 wrote to memory of 4068 1800 rundll32.exe 84 PID 1800 wrote to memory of 4068 1800 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CShell.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CShell.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4068
-