Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 05:01

General

  • Target

    98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406.dll

  • Size

    1.9MB

  • MD5

    95d8e73e2f99522d68b598349a6c1aa7

  • SHA1

    82bc23ee7c04e65e3356aa05c847d7b10cf4e863

  • SHA256

    98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406

  • SHA512

    93b649e2fc5ffd25ea46806c09f789ef87b1f8bc4010d50cfacf93b093a8fe0394efa166af21dc27016d01a451c14962f43f00ae8ad40a4d983a87b307d9783d

  • SSDEEP

    49152:K2D3d+kU5+firG8zMAOd86vErgVNRGnbRi:Vc5wi61bhM4eA

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406.dll,#1
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2468 -s 120
      2⤵
        PID:2076

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2468-0-0x000007FEF5D80000-0x000007FEF6278000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-1-0x000007FEF5880000-0x000007FEF5D78000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-3-0x000007FEF5880000-0x000007FEF5D78000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-2-0x000007FEF5D80000-0x000007FEF6278000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-4-0x000007FEF5880000-0x000007FEF5D78000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-6-0x000007FEF5880000-0x000007FEF5D78000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-5-0x000007FEF5880000-0x000007FEF5D78000-memory.dmp

            Filesize

            5.0MB

          • memory/2468-7-0x000007FEF5880000-0x000007FEF5D78000-memory.dmp

            Filesize

            5.0MB