Overview
overview
9Static
static
72b3aa9f8d9...84.exe
windows7-x64
42b3aa9f8d9...84.exe
windows10-2004-x64
4$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DRCom.dll
windows7-x64
9DRCom.dll
windows10-2004-x64
9Qt5Core.dll
windows7-x64
1Qt5Core.dll
windows10-2004-x64
3Qt5Gui.dll
windows7-x64
1Qt5Gui.dll
windows10-2004-x64
1Qt5Network.dll
windows7-x64
3Qt5Network.dll
windows10-2004-x64
3Qt5PrintSupport.dll
windows7-x64
3Qt5PrintSupport.dll
windows10-2004-x64
3Qt5Svg.dll
windows7-x64
3Qt5Svg.dll
windows10-2004-x64
3Qt5WebKit.dll
windows7-x64
3Qt5WebKit.dll
windows10-2004-x64
3Qt5WebKitWidgets.dll
windows7-x64
3Qt5WebKitWidgets.dll
windows10-2004-x64
3Qt5Widgets.dll
windows7-x64
3Qt5Widgets.dll
windows10-2004-x64
3Qt5WinExtras.dll
windows7-x64
3Qt5WinExtras.dll
windows10-2004-x64
3Qt5Xml.dll
windows7-x64
3Qt5Xml.dll
windows10-2004-x64
3iconengine...on.dll
windows7-x64
1iconengine...on.dll
windows10-2004-x64
1icudt57.dll
windows7-x64
1icudt57.dll
windows10-2004-x64
1Analysis
-
max time kernel
128s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:25
Behavioral task
behavioral1
Sample
2b3aa9f8d949be0919837b8f00c79700c0db437a6a8f042fcff2ec4b2c03c584.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b3aa9f8d949be0919837b8f00c79700c0db437a6a8f042fcff2ec4b2c03c584.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
DRCom.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
DRCom.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Qt5Core.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Qt5Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Qt5Gui.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Qt5Gui.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Qt5Network.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Qt5Network.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Qt5PrintSupport.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Qt5PrintSupport.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Qt5Svg.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
Qt5Svg.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Qt5WebKit.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Qt5WebKit.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Qt5WebKitWidgets.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Qt5WebKitWidgets.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Qt5Widgets.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
Qt5Widgets.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Qt5WinExtras.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Qt5WinExtras.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Qt5Xml.dll
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
Qt5Xml.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
iconengines/qsvgicon.dll
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
iconengines/qsvgicon.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
icudt57.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
icudt57.dll
Resource
win10v2004-20240426-en
General
-
Target
DRCom.dll
-
Size
2.8MB
-
MD5
3c8493c81b10ccb36a153cb7b4a6e6d7
-
SHA1
8834fed8a9595f35e86c6b39eb2993b85041344e
-
SHA256
ac8353cad0c254f179eaa67eec12392da4847931f2d8f4bddfcf732d5eabd77c
-
SHA512
ae057e71e0ae0dcb55cc8cac44fa9af986a11d4e8b6eec293ad061685f3f52d930d5746f32b42f0e601359c117a94f37e6529f336293a429ba2a51b8c62569ed
-
SSDEEP
49152:82TB73A+tsF0cPhBQqOwzuWJgNmVc5l9+YW9FXtJi0b5cHU50Qsh/:84R6qcPJuNmVMYYO3Ji0b5cH407h/
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral8/memory/2296-0-0x0000000010000000-0x000000001071C000-memory.dmp themida behavioral8/memory/2296-2-0x0000000010000000-0x000000001071C000-memory.dmp themida behavioral8/memory/2296-3-0x0000000010000000-0x000000001071C000-memory.dmp themida behavioral8/memory/2296-4-0x0000000010000000-0x000000001071C000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2296 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2296 rundll32.exe 2296 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3464 wrote to memory of 2296 3464 rundll32.exe rundll32.exe PID 3464 wrote to memory of 2296 3464 rundll32.exe rundll32.exe PID 3464 wrote to memory of 2296 3464 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DRCom.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DRCom.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2296
-