Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 16:30
Behavioral task
behavioral1
Sample
58172dca112b9ac8ab686a2b65205a0618fecd85a227b9f271ffc907f863208a.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58172dca112b9ac8ab686a2b65205a0618fecd85a227b9f271ffc907f863208a.dll
Resource
win10v2004-20220721-en
General
-
Target
58172dca112b9ac8ab686a2b65205a0618fecd85a227b9f271ffc907f863208a.dll
-
Size
14KB
-
MD5
4a35670f74dedc80a63800b7a6359325
-
SHA1
a3e091ce807da2572fba42385330c72f99272548
-
SHA256
58172dca112b9ac8ab686a2b65205a0618fecd85a227b9f271ffc907f863208a
-
SHA512
0bc530960e7e8e61d392cc8ea4c35ea555eb51f15becb0ed8a4d9cc37c39a5b632d2a78a4f96f5e792216609e7ddcabfb3f99bc3150cebfbdfff95bf36627c6f
Malware Config
Extracted
metasploit
windows/download_exec
http://88.190.215.7:443/aWn6
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request 7 IoCs
Processes:
rundll32.exeflow pid process 3 1948 rundll32.exe 4 1948 rundll32.exe 6 1948 rundll32.exe 7 1948 rundll32.exe 8 1948 rundll32.exe 9 1948 rundll32.exe 11 1948 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1876 set thread context of 1948 1876 rundll32.exe rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1876 1660 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1948 1876 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58172dca112b9ac8ab686a2b65205a0618fecd85a227b9f271ffc907f863208a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58172dca112b9ac8ab686a2b65205a0618fecd85a227b9f271ffc907f863208a.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- Blocklisted process makes network request
PID:1948