Analysis
-
max time kernel
62s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 00:12
Static task
static1
Behavioral task
behavioral1
Sample
ac2071e4dc5422825963da4f321466c4d3376498902b0ea1aa56e1e6ef576572.dll
Resource
win7-20220414-en
General
-
Target
ac2071e4dc5422825963da4f321466c4d3376498902b0ea1aa56e1e6ef576572.dll
-
Size
3.4MB
-
MD5
1dc00acdb581b52fbc009ffa34997d8e
-
SHA1
141f592b11ec85b523d5bd56905a54956e20a4b6
-
SHA256
ac2071e4dc5422825963da4f321466c4d3376498902b0ea1aa56e1e6ef576572
-
SHA512
168f48276a5dd084351340ec34af97c6a6c189ba6f614af2046d31ba12d50cdda71a7f23f2ee1e50030f9d060e5bd5a3fe32e76d87ab7e0313dd237238bb92ab
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
extrac32.exepid process 960 extrac32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeextrac32.exepid process 1932 rundll32.exe 960 extrac32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
extrac32.exepid process 960 extrac32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
rundll32.exedescription pid process Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe Token: SeBackupPrivilege 1932 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1932 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
rundll32.exerundll32.exeextrac32.exedescription pid process target process PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1932 1624 rundll32.exe rundll32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 1932 wrote to memory of 960 1932 rundll32.exe extrac32.exe PID 960 wrote to memory of 1168 960 extrac32.exe cmd.exe PID 960 wrote to memory of 1168 960 extrac32.exe cmd.exe PID 960 wrote to memory of 1168 960 extrac32.exe cmd.exe PID 960 wrote to memory of 1168 960 extrac32.exe cmd.exe PID 960 wrote to memory of 1168 960 extrac32.exe cmd.exe PID 960 wrote to memory of 1168 960 extrac32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac2071e4dc5422825963da4f321466c4d3376498902b0ea1aa56e1e6ef576572.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac2071e4dc5422825963da4f321466c4d3376498902b0ea1aa56e1e6ef576572.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\extrac32.exe"C:\Windows\system32\extrac32.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"4⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\cmd.exeFilesize
295KB
MD5ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1
-
memory/960-58-0x0000000000000000-mapping.dmp
-
memory/960-60-0x00000000043C0000-0x0000000004442000-memory.dmpFilesize
520KB
-
memory/960-61-0x0000000076E30000-0x0000000076FD9000-memory.dmpFilesize
1.7MB
-
memory/960-62-0x00000000008D0000-0x00000000008D8000-memory.dmpFilesize
32KB
-
memory/960-63-0x00000000043C6000-0x00000000043D6000-memory.dmpFilesize
64KB
-
memory/1932-54-0x0000000000000000-mapping.dmp
-
memory/1932-55-0x0000000075C71000-0x0000000075C73000-memory.dmpFilesize
8KB
-
memory/1932-56-0x0000000001DA0000-0x0000000002126000-memory.dmpFilesize
3.5MB
-
memory/1932-57-0x0000000000110000-0x0000000000119000-memory.dmpFilesize
36KB