Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
cc561df6a742feaf5fbee1119fae30ff.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc561df6a742feaf5fbee1119fae30ff.dll
Resource
win10v2004-20240226-en
General
-
Target
cc561df6a742feaf5fbee1119fae30ff.dll
-
Size
2.2MB
-
MD5
cc561df6a742feaf5fbee1119fae30ff
-
SHA1
a9561ba73168f1add8fc9266c90ec253c0e55f65
-
SHA256
6698ac5893a87bf3fb9c932ce7a8354e96af14ef271cd803e79a29c7c196e341
-
SHA512
a8a26ce29f2595b89f9ddf0c1510cd6a8541f608401b41d86e15efe8977e5a0931e13aa8f55534702b1fdfb86a7b9bc6333a93f7c309c0753bf0a1297d2f0278
-
SSDEEP
49152:HoCjQ4nU7NG3vLFGW8GHgYOwTvRwVZaLIiwlf8hRkmq4kg:ICjQ/JGj8dDSvEiSf1mqPg
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 488 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1068 488 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 488 rundll32.exe 488 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 488 2208 rundll32.exe 86 PID 2208 wrote to memory of 488 2208 rundll32.exe 86 PID 2208 wrote to memory of 488 2208 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc561df6a742feaf5fbee1119fae30ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc561df6a742feaf5fbee1119fae30ff.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 6683⤵
- Program crash
PID:1068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 488 -ip 4881⤵PID:4088