Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 09:17
Static task
static1
Behavioral task
behavioral1
Sample
8870d706e08ddb73e16bb07a0eb813bd83bb512a6435b55841caf5a5df7907fa.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8870d706e08ddb73e16bb07a0eb813bd83bb512a6435b55841caf5a5df7907fa.dll
Resource
win10v2004-20220901-en
General
-
Target
8870d706e08ddb73e16bb07a0eb813bd83bb512a6435b55841caf5a5df7907fa.dll
-
Size
84KB
-
MD5
5ee340cd83fd65e07a3b3c340099f489
-
SHA1
966ed0bb8fd37e0df01d249446b1596b850da670
-
SHA256
8870d706e08ddb73e16bb07a0eb813bd83bb512a6435b55841caf5a5df7907fa
-
SHA512
099fa28e338f10e7c3d38bfaa2e5d48bf24f9be7b0ba80850011a068965575bb31f5d421bbf7492a805d90184731e2e395b71bbc4e20a1ebad15f762e41d4b79
-
SSDEEP
1536:JI6S0ezyD3LxH1OpE081GNUeAcAeezk15RrK:JI6SVyD3Lx4pE081GqcA4pr
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1224 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1224 1416 rundll32.exe 27 PID 1416 wrote to memory of 1224 1416 rundll32.exe 27 PID 1416 wrote to memory of 1224 1416 rundll32.exe 27 PID 1416 wrote to memory of 1224 1416 rundll32.exe 27 PID 1416 wrote to memory of 1224 1416 rundll32.exe 27 PID 1416 wrote to memory of 1224 1416 rundll32.exe 27 PID 1416 wrote to memory of 1224 1416 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8870d706e08ddb73e16bb07a0eb813bd83bb512a6435b55841caf5a5df7907fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8870d706e08ddb73e16bb07a0eb813bd83bb512a6435b55841caf5a5df7907fa.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:1224
-