Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
aquatic/crack.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aquatic/crack.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
aquatic/loader.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
aquatic/loader.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
aquatic/main.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
aquatic/main.exe
Resource
win10v2004-20240508-en
General
-
Target
aquatic/crack.dll
-
Size
5.1MB
-
MD5
fe7dc4218e47f5c31e7a2db9b2e55ddd
-
SHA1
6d30688097e87755b5d59429e5dfb9ce0562f931
-
SHA256
1cbaa9f954edae2e9a6ccac8e0119ff533ee01b42b1bb24fa10adfa80064b780
-
SHA512
922048e800411cb7f21618647b88b0d8b5c98aa45a55eb8ab66a838f3900bed6e03cd247e27af0b304bd4b71fa6402d1b88aa320aa4c23a42088a1617dac73c7
-
SSDEEP
98304:ZvNYCYPKFV3CIz5igBo6qO90Pqp8YVH/6yG/fdmjLdGGf:ZvyWLNia90S7iyb
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 760 2148 rundll32.exe 28 PID 2148 wrote to memory of 760 2148 rundll32.exe 28 PID 2148 wrote to memory of 760 2148 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aquatic\crack.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2148 -s 1162⤵PID:760
-