Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 17:28
Behavioral task
behavioral1
Sample
elfbot.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
elfbot.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
elfload.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
elfload.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
elfload2.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
elfload2.dll
Resource
win10v2004-20240802-en
General
-
Target
elfbot.dll
-
Size
1.4MB
-
MD5
9b948e02a141517d50a5328bda57e965
-
SHA1
262eec74677e50e85952fd7e0a256adc64db431e
-
SHA256
eb84edb1b813e5b433607fa3ea4a4c344059fcb099b2380976879ddab08408b6
-
SHA512
03418fbaac748f6e8053c56610a653601209eafb6d1273b43f340afb6f7b0347dbd95ff4790df76394dba9d96ae273b0f58a22669ea4a692dbe83eafed610af5
-
SSDEEP
24576:vi0Tf1DxMVVvmdrjM+TrQRlUsh5SEjPtA8JP9WVoAgYxcZ6mdL:vvMVYBM+TsfUI1d9gorYhml
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 29 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Typelib rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Outlook, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Outlook._DocSiteControlClass" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\MiscStatus rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\ToolboxBitmap32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLOOK.EXE, 5518" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\RuntimeVersion = "v2.0.50727" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\LocalServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\LocalServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLOOK.EXE" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\MiscStatus\1 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Version\ = "9.4" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\MiscStatus\1\ = "131200" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Version rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\ = "Microsoft Outlook Body Control" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Implemented Categories rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\ToolboxBitmap32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocHandler32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\Class = "Microsoft.Office.Interop.Outlook._DocSiteControlClass" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\ProgId rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Control rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\14.0.0.0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\ProgId\ = "DOCSITE.DocSiteControl.1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\Typelib\ = "{00062FFF-0000-0000-C000-000000000046}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\MiscStatus\ = "0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocHandler32\ = "ole32.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\Assembly = "Microsoft.Office.Interop.Outlook, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F97D07F-1A7E-1F74-4259-375779F76D41}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2040 rundll32.exe Token: SeIncBasePriorityPrivilege 2040 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\elfbot.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\elfbot.dll,#12⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2040
-