Resubmissions
17/10/2024, 16:58
241017-vgyaxayerm 717/10/2024, 16:57
241017-vgdlhavhpe 717/10/2024, 16:55
241017-vflwgsyelp 7Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 16:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
zlib0.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
zlib0.dll
Resource
win10v2004-20241007-en
1 signatures
150 seconds
General
-
Target
zlib0.dll
-
Size
2.3MB
-
MD5
72eefa46f7da32d50e5e53c8ea1e4bc0
-
SHA1
fc0ed150cdb8c3b6154077b1e4aa1ef5a1e16063
-
SHA256
4258a0be37aaf67452610fd08bbdb37da3614dd9a50c97971691b0b27cdf3b84
-
SHA512
5d57b6e39739e964df739a421ee9ae6a32df37f4b337a2c6794cbc4bdfb7d6c2a433acd80842765afc7111bca40a87b5040d7982dff93f3098c7e175e7ec8b64
-
SSDEEP
49152:aa5adrLLHlaYs4Lx9EJaokT6bIh12aLeM2UI5SHXsrM8sdMOnz:LKLHlasLIJaNuba0gPrH8rpir
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2992 2816 rundll32.exe 31 PID 2816 wrote to memory of 2992 2816 rundll32.exe 31 PID 2816 wrote to memory of 2992 2816 rundll32.exe 31