Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 00:50
Static task
static1
Behavioral task
behavioral1
Sample
e20625c960a91ec091691275bb549b73c154bd4f8fa4305ed414a28e321e4aaf.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e20625c960a91ec091691275bb549b73c154bd4f8fa4305ed414a28e321e4aaf.dll
Resource
win10-en-20211208
General
-
Target
e20625c960a91ec091691275bb549b73c154bd4f8fa4305ed414a28e321e4aaf.dll
-
Size
164KB
-
MD5
9c65d2fd6624be4b0d3804aacf80956a
-
SHA1
296052d476b8857eaa5529d4a6cbc8a0ed73bc3b
-
SHA256
e20625c960a91ec091691275bb549b73c154bd4f8fa4305ed414a28e321e4aaf
-
SHA512
a87632bd316d25e868a9a3ab37b794436cae52e1764c631655aa8f15cbd764e6fe39741fd6828122873fcbde294cb7697d387aae1950913789a1541f8e7ad494
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\U: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3472 rundll32.exe 3472 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2720 wrote to memory of 3472 2720 rundll32.exe rundll32.exe PID 2720 wrote to memory of 3472 2720 rundll32.exe rundll32.exe PID 2720 wrote to memory of 3472 2720 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e20625c960a91ec091691275bb549b73c154bd4f8fa4305ed414a28e321e4aaf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e20625c960a91ec091691275bb549b73c154bd4f8fa4305ed414a28e321e4aaf.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3968