Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 21:55

General

  • Target

    aquatic/crack.dll

  • Size

    5.1MB

  • MD5

    fe7dc4218e47f5c31e7a2db9b2e55ddd

  • SHA1

    6d30688097e87755b5d59429e5dfb9ce0562f931

  • SHA256

    1cbaa9f954edae2e9a6ccac8e0119ff533ee01b42b1bb24fa10adfa80064b780

  • SHA512

    922048e800411cb7f21618647b88b0d8b5c98aa45a55eb8ab66a838f3900bed6e03cd247e27af0b304bd4b71fa6402d1b88aa320aa4c23a42088a1617dac73c7

  • SSDEEP

    98304:ZvNYCYPKFV3CIz5igBo6qO90Pqp8YVH/6yG/fdmjLdGGf:ZvyWLNia90S7iyb

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aquatic\crack.dll,#1
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2148 -s 116
      2⤵
        PID:760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2148-0-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-3-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-6-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-5-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-4-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-2-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-1-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB

    • memory/2148-7-0x0000000073890000-0x0000000074284000-memory.dmp

      Filesize

      10.0MB