Overview
overview
9Static
static
7net6.0-win...er.exe
windows7-x64
1net6.0-win...er.exe
windows10-2004-x64
1net6.0-win...er.exe
windows7-x64
3net6.0-win...er.exe
windows10-2004-x64
1net6.0-win...re.dll
windows7-x64
6net6.0-win...re.dll
windows10-2004-x64
6net6.0-win...ms.dll
windows7-x64
6net6.0-win...ms.dll
windows10-2004-x64
6net6.0-win...pf.dll
windows7-x64
6net6.0-win...pf.dll
windows10-2004-x64
6net6.0-win...on.dll
windows7-x64
1net6.0-win...on.dll
windows10-2004-x64
1net6.0-win...ol.dll
windows7-x64
1net6.0-win...ol.dll
windows10-2004-x64
1net6.0-win...ol.dll
windows7-x64
1net6.0-win...ol.dll
windows10-2004-x64
1net6.0-win...pi.dll
windows7-x64
9net6.0-win...pi.dll
windows10-2004-x64
9net6.0-win...re.dll
windows7-x64
6net6.0-win...re.dll
windows10-2004-x64
6net6.0-win...pet.js
windows7-x64
6net6.0-win...pet.js
windows10-2004-x64
6Microsoft....re.dll
windows7-x64
1Microsoft....re.dll
windows10-2004-x64
1adblock_snippet.js
windows7-x64
3adblock_snippet.js
windows10-2004-x64
3net6.0-win...rl.dll
windows7-x64
1net6.0-win...rl.dll
windows10-2004-x64
1net6.0-win...sh.dll
windows7-x64
1net6.0-win...sh.dll
windows10-2004-x64
1net6.0-win...b1.dll
windows7-x64
1net6.0-win...b1.dll
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 20:49
Behavioral task
behavioral1
Sample
net6.0-windows/Synapse Launcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
net6.0-windows/Synapse Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
net6.0-windows/Synapse Launcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
net6.0-windows/Synapse Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
net6.0-windows/lib/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
net6.0-windows/lib/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
net6.0-windows/lib/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
net6.0-windows/lib/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
net6.0-windows/lib/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
net6.0-windows/lib/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
net6.0-windows/lib/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
net6.0-windows/lib/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
net6.0-windows/lib/PagedControl.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
net6.0-windows/lib/PagedControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
net6.0-windows/lib/TabControl.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
net6.0-windows/lib/TabControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
net6.0-windows/lib/VirtualApi.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
net6.0-windows/lib/VirtualApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
net6.0-windows/lib/WebView2Files/EBWebView/Speech Recognition/1.15.0.1/Microsoft.CognitiveServices.Speech.core.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
net6.0-windows/lib/WebView2Files/EBWebView/Speech Recognition/1.15.0.1/Microsoft.CognitiveServices.Speech.core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
net6.0-windows/lib/WebView2Files/EBWebView/Subresource Filter/Unindexed Rules/10.34.0.54/adblock_snippet.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
net6.0-windows/lib/WebView2Files/EBWebView/Subresource Filter/Unindexed Rules/10.34.0.54/adblock_snippet.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Microsoft.CognitiveServices.Speech.core.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Microsoft.CognitiveServices.Speech.core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
adblock_snippet.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
adblock_snippet.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
net6.0-windows/lib/libcurl.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
net6.0-windows/lib/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
net6.0-windows/lib/xxhash.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
net6.0-windows/lib/xxhash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
net6.0-windows/lib/zlib1.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
net6.0-windows/lib/zlib1.dll
Resource
win10v2004-20240802-en
General
-
Target
net6.0-windows/lib/VirtualApi.dll
-
Size
4.1MB
-
MD5
e3710cbc198551fa6800800820202d5b
-
SHA1
1fa4486948651eb09b1193f6f66ed8fdb8a9876a
-
SHA256
730c9a8aca3c2057b2462f0255838b78994527abf78e0e186d211ed00e497df3
-
SHA512
4e55d15f0c0fafb6075409de9573099e4d39e38e6c9f70ef2a8f25dcf1218fd6ce4ef6908e513dc11cfa9946c2119e3e03f9f7b4a7a8ac32f3759222e903db3a
-
SSDEEP
98304:huf3xhg2rqe4J3Qbc8g7nj/kPMSFoua5AB34Sr:M9TLNg7njWFoua6340
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2468 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
resource yara_rule behavioral17/memory/2468-1-0x0000000180000000-0x0000000180ACD000-memory.dmp themida behavioral17/memory/2468-2-0x0000000180000000-0x0000000180ACD000-memory.dmp themida behavioral17/memory/2468-3-0x0000000180000000-0x0000000180ACD000-memory.dmp themida behavioral17/memory/2468-5-0x0000000180000000-0x0000000180ACD000-memory.dmp themida behavioral17/memory/2468-7-0x0000000180000000-0x0000000180ACD000-memory.dmp themida behavioral17/memory/2468-6-0x0000000180000000-0x0000000180ACD000-memory.dmp themida behavioral17/memory/2468-8-0x0000000180000000-0x0000000180ACD000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2468 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2468 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2760 2468 rundll32.exe 31 PID 2468 wrote to memory of 2760 2468 rundll32.exe 31 PID 2468 wrote to memory of 2760 2468 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\net6.0-windows\lib\VirtualApi.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2468 -s 922⤵PID:2760
-