Analysis
-
max time kernel
59s -
max time network
44s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-09-2021 17:02
Static task
static1
Behavioral task
behavioral1
Sample
dhq.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dhq.dll
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
dhq.dll
-
Size
712KB
-
MD5
6e72b76795624c0cd578c24342453c7c
-
SHA1
7866fe84f3b53267bfe505bcec20467b05a6e074
-
SHA256
ebb22358cc0ce4bc40c76e1c02df8d304fd0b27e9793c7cbcc02f23b4e3c1c89
-
SHA512
279604b40b7d09d18de65ee7ec3c934879ad9d343d80114b1cec3a49d8740cab11b74bc57cea3ed4d2b93e0b98ab5fef8883592186e35234211acd7bc443ffd1
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1928 adobe1.exe 1324 adobe1.exe -
resource yara_rule behavioral1/memory/1324-70-0x0000000013140000-0x000000001338D000-memory.dmp upx behavioral1/memory/1324-74-0x0000000013140000-0x000000001338D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1956 rundll32.exe 1928 adobe1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 1324 1928 adobe1.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1640 wrote to memory of 1956 1640 rundll32.exe 25 PID 1956 wrote to memory of 1928 1956 rundll32.exe 28 PID 1956 wrote to memory of 1928 1956 rundll32.exe 28 PID 1956 wrote to memory of 1928 1956 rundll32.exe 28 PID 1956 wrote to memory of 1928 1956 rundll32.exe 28 PID 1956 wrote to memory of 2044 1956 rundll32.exe 31 PID 1956 wrote to memory of 2044 1956 rundll32.exe 31 PID 1956 wrote to memory of 2044 1956 rundll32.exe 31 PID 1956 wrote to memory of 2044 1956 rundll32.exe 31 PID 1928 wrote to memory of 1324 1928 adobe1.exe 32 PID 1928 wrote to memory of 1324 1928 adobe1.exe 32 PID 1928 wrote to memory of 1324 1928 adobe1.exe 32 PID 1928 wrote to memory of 1324 1928 adobe1.exe 32 PID 1928 wrote to memory of 1324 1928 adobe1.exe 32 PID 1928 wrote to memory of 1324 1928 adobe1.exe 32 PID 1324 wrote to memory of 580 1324 adobe1.exe 33 PID 1324 wrote to memory of 580 1324 adobe1.exe 33 PID 1324 wrote to memory of 580 1324 adobe1.exe 33 PID 1324 wrote to memory of 580 1324 adobe1.exe 33 PID 1324 wrote to memory of 580 1324 adobe1.exe 33 PID 1324 wrote to memory of 852 1324 adobe1.exe 34 PID 1324 wrote to memory of 852 1324 adobe1.exe 34 PID 1324 wrote to memory of 852 1324 adobe1.exe 34 PID 1324 wrote to memory of 852 1324 adobe1.exe 34 PID 1324 wrote to memory of 852 1324 adobe1.exe 34 PID 1324 wrote to memory of 1784 1324 adobe1.exe 35 PID 1324 wrote to memory of 1784 1324 adobe1.exe 35 PID 1324 wrote to memory of 1784 1324 adobe1.exe 35 PID 1324 wrote to memory of 1784 1324 adobe1.exe 35 PID 1324 wrote to memory of 1784 1324 adobe1.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dhq.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dhq.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\adobe1.exeC:\Users\Admin\AppData\Local\Temp\\adobe1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\adobe1.exeC:\Users\Admin\AppData\Local\Temp\\adobe1.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1784
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\reader.pdf"3⤵PID:2044
-
-