Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2022 15:12
Behavioral task
behavioral1
Sample
51cb071e76dd031fe158a41b77a8c76d1fd2f29e6ffbc1ea46f6d9b2f1a55440.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
51cb071e76dd031fe158a41b77a8c76d1fd2f29e6ffbc1ea46f6d9b2f1a55440.dll
Resource
win10v2004-20220414-en
General
-
Target
51cb071e76dd031fe158a41b77a8c76d1fd2f29e6ffbc1ea46f6d9b2f1a55440.dll
-
Size
164KB
-
MD5
d8129c675e175ebb870192d6cfbaa37d
-
SHA1
ea97d882463fbc1f3a5c42c836767683dbbe36b1
-
SHA256
51cb071e76dd031fe158a41b77a8c76d1fd2f29e6ffbc1ea46f6d9b2f1a55440
-
SHA512
ceec3fb12e7070955660fb9fa3aabbefbdbcfd0b7c671b4ca3d43497698087281e643d7890d7c7764ccc9e6725856c0faa64aa5cbbab68298fa17687733b128b
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1800 wrote to memory of 2260 1800 rundll32.exe rundll32.exe PID 1800 wrote to memory of 2260 1800 rundll32.exe rundll32.exe PID 1800 wrote to memory of 2260 1800 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51cb071e76dd031fe158a41b77a8c76d1fd2f29e6ffbc1ea46f6d9b2f1a55440.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51cb071e76dd031fe158a41b77a8c76d1fd2f29e6ffbc1ea46f6d9b2f1a55440.dll,#12⤵
- Enumerates connected drives
PID:2260