Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:16
Behavioral task
behavioral1
Sample
cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701.dll
Resource
win7-20240729-en
windows7-x64
6 signatures
150 seconds
General
-
Target
cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701.dll
-
Size
3.6MB
-
MD5
e134a2ba494c8b6fd3234fbdd410a333
-
SHA1
56738f2fef4c090b68c4aed5fb9ab42c5ab4d63c
-
SHA256
cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701
-
SHA512
2f5a7989cb37757151ecea58a43a82828be9ad35631c2029fd119c9c4cd44c7131317accdf4972dec22ff363e79097d2765e1bbd13b07a2912974ba8f8997a05
-
SSDEEP
98304:seHguQzSvxF+zqk2PhA/F+nsyVcCE9M2jqjhVY:vyzSfoq9PvYmcChVY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2584-1-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida behavioral1/memory/2584-3-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida behavioral1/memory/2584-8-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida behavioral1/memory/2584-9-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida behavioral1/memory/2584-7-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida behavioral1/memory/2584-6-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida behavioral1/memory/2584-10-0x000007FEF5E50000-0x000007FEF67FC000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2584 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2584 wrote to memory of 2372 2584 rundll32.exe WerFault.exe PID 2584 wrote to memory of 2372 2584 rundll32.exe WerFault.exe PID 2584 wrote to memory of 2372 2584 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2584 -s 1762⤵PID:2372
-