Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 13:11
Behavioral task
behavioral1
Sample
a573a413cbb1694d985376788d42ab2b342e6ce94dd1599602b73f5cca695d8f.dll
Resource
win7-20231129-en
6 signatures
150 seconds
General
-
Target
a573a413cbb1694d985376788d42ab2b342e6ce94dd1599602b73f5cca695d8f.dll
-
Size
2.4MB
-
MD5
5bf9b9d44414ca71dfd7159b00cbc8d6
-
SHA1
7bee238bbf995a118c1cd22299cfab8732d71eb2
-
SHA256
a573a413cbb1694d985376788d42ab2b342e6ce94dd1599602b73f5cca695d8f
-
SHA512
2ac034181a8be1d28d5fdcda6ac60ca2f51bb8a477f294804800fec5d54633064e5fa0be7ad82cec27164242ba5f6aafaa15ac8336d9054af88ec2186ea3f6a2
-
SSDEEP
49152:U1Y60SANj4KrFakICZnim2Ybv9e9xEoyiUJMJVnuJG:STyJrFaknl2Yjynu0
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
resource yara_rule behavioral1/memory/1992-0-0x0000000010000000-0x0000000010662000-memory.dmp themida behavioral1/memory/1992-1-0x0000000010000000-0x0000000010662000-memory.dmp themida behavioral1/memory/1992-2-0x0000000010000000-0x0000000010662000-memory.dmp themida behavioral1/memory/1992-3-0x0000000010000000-0x0000000010662000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1992 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1992 2360 rundll32.exe 28 PID 2360 wrote to memory of 1992 2360 rundll32.exe 28 PID 2360 wrote to memory of 1992 2360 rundll32.exe 28 PID 2360 wrote to memory of 1992 2360 rundll32.exe 28 PID 2360 wrote to memory of 1992 2360 rundll32.exe 28 PID 2360 wrote to memory of 1992 2360 rundll32.exe 28 PID 2360 wrote to memory of 1992 2360 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a573a413cbb1694d985376788d42ab2b342e6ce94dd1599602b73f5cca695d8f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a573a413cbb1694d985376788d42ab2b342e6ce94dd1599602b73f5cca695d8f.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1992
-