Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 12:52
Static task
static1
Behavioral task
behavioral1
Sample
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll
Resource
win10v2004-20220901-en
General
-
Target
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll
-
Size
268KB
-
MD5
6351a9131a85dad788af5b3b04efbff7
-
SHA1
e8c88d8bf3b17ef32fa833ea2d3614571a71f56e
-
SHA256
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804
-
SHA512
cf1c1befdef7feed81a9d5b79191b668c5ddf41bf1bbc8a325bd312cbd0a321d619326fb53689f2142e884522ab19201f207a8f6845299071aaed8055d8b8a33
-
SSDEEP
6144:nx2Kd1I7DkuX6WMqHtsoSViniktwHVUWoS2k6SCCr84ceKs76g42H6R2myeXI4sH:ncK7IEA6WGok5k6XofeKotXH6hBXI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Mqixikufi = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 608 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 608 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1648 wrote to memory of 608 1648 rundll32.exe 28 PID 1648 wrote to memory of 608 1648 rundll32.exe 28 PID 1648 wrote to memory of 608 1648 rundll32.exe 28 PID 1648 wrote to memory of 608 1648 rundll32.exe 28 PID 1648 wrote to memory of 608 1648 rundll32.exe 28 PID 1648 wrote to memory of 608 1648 rundll32.exe 28 PID 1648 wrote to memory of 608 1648 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:608
-