Analysis
-
max time kernel
18s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 19:57
General
-
Target
RAT.dll
-
Size
6.5MB
-
MD5
456e3526ad5a6b5a5a47cd6faf3360e2
-
SHA1
6004bb0e362ff64a2995d4682360d9eced6ba14a
-
SHA256
db6f5cb8d4b23fd4b6a63c9bf0078de7e5d56d37d5c3a672a3c35f6e402f0e1d
-
SHA512
9b1e99a293b26936079acf21ee2999fe54626b0b976a0e6e86b1e28a3f728dc0fda04453bbae7653e0250417acda586a41ec79a86da2bf7b67e5bae8b9dd1cd9
-
SSDEEP
196608:/0t2b4JBRP01EbobwDhKqpYSIc1hFD54t5mtMhJHG:I2bmGEMb0hKqeo1hFSbxQ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
resource yara_rule behavioral1/memory/4968-0-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-2-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-3-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-4-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-5-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-6-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-7-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-8-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida behavioral1/memory/4968-9-0x00007FFCB72A0000-0x00007FFCB82C9000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4968 rundll32.exe