Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 05:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406.dll
Resource
win7-20240220-en
4 signatures
150 seconds
General
-
Target
98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406.dll
-
Size
1.9MB
-
MD5
95d8e73e2f99522d68b598349a6c1aa7
-
SHA1
82bc23ee7c04e65e3356aa05c847d7b10cf4e863
-
SHA256
98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406
-
SHA512
93b649e2fc5ffd25ea46806c09f789ef87b1f8bc4010d50cfacf93b093a8fe0394efa166af21dc27016d01a451c14962f43f00ae8ad40a4d983a87b307d9783d
-
SSDEEP
49152:K2D3d+kU5+firG8zMAOd86vErgVNRGnbRi:Vc5wi61bhM4eA
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2076 2468 rundll32.exe 28 PID 2468 wrote to memory of 2076 2468 rundll32.exe 28 PID 2468 wrote to memory of 2076 2468 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98f0b9f089ece71841ff2e8d543997dcc5ab7762ba916b7a1d10d0c44dc18406.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2468 -s 1202⤵PID:2076
-