Analysis
-
max time kernel
177s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 05:36
Behavioral task
behavioral1
Sample
5982fb0c9e888cd3be9cfdf7a2b620122d99af6414efdb115ddaa61d5c1981b1.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
5982fb0c9e888cd3be9cfdf7a2b620122d99af6414efdb115ddaa61d5c1981b1.dll
-
Size
52KB
-
MD5
8b2457a9e2e924c107838eef31fa8723
-
SHA1
74f533e3609e12f13338a38c4c3784612601b8b0
-
SHA256
5982fb0c9e888cd3be9cfdf7a2b620122d99af6414efdb115ddaa61d5c1981b1
-
SHA512
ba668dc45ab7c53b4606d126929111b3e54c5cf59a1ebba7b00106c8d36caa027a9c4bb27d83e6f8caefd9474a9e204b149669d16bab8d2de7f8ed75dab21ce2
Malware Config
Extracted
Family
gootkit
Botnet
4
C2
ewerwelk.net
neperalani.com
Attributes
-
vendor_id
4
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 896 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 896 800 rundll32.exe rundll32.exe PID 896 wrote to memory of 952 896 rundll32.exe svchost.exe PID 896 wrote to memory of 952 896 rundll32.exe svchost.exe PID 896 wrote to memory of 952 896 rundll32.exe svchost.exe PID 896 wrote to memory of 952 896 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5982fb0c9e888cd3be9cfdf7a2b620122d99af6414efdb115ddaa61d5c1981b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5982fb0c9e888cd3be9cfdf7a2b620122d99af6414efdb115ddaa61d5c1981b1.dll,#12⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Checks BIOS information in registry
- Checks processor information in registry
PID:952
-
-