Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:16
Behavioral task
behavioral1
Sample
cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701.dll
Resource
win7-20240729-en
windows7-x64
6 signatures
150 seconds
General
-
Target
cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701.dll
-
Size
3.6MB
-
MD5
e134a2ba494c8b6fd3234fbdd410a333
-
SHA1
56738f2fef4c090b68c4aed5fb9ab42c5ab4d63c
-
SHA256
cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701
-
SHA512
2f5a7989cb37757151ecea58a43a82828be9ad35631c2029fd119c9c4cd44c7131317accdf4972dec22ff363e79097d2765e1bbd13b07a2912974ba8f8997a05
-
SSDEEP
98304:seHguQzSvxF+zqk2PhA/F+nsyVcCE9M2jqjhVY:vyzSfoq9PvYmcChVY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/876-0-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida behavioral2/memory/876-2-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida behavioral2/memory/876-5-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida behavioral2/memory/876-3-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida behavioral2/memory/876-4-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida behavioral2/memory/876-6-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida behavioral2/memory/876-7-0x00007FFCD4440000-0x00007FFCD4DEC000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 876 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbecc6a7b633f72c9edfa08e394d893f68ff73b32e60955234f920d141529701.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:876