Analysis
-
max time kernel
159s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 12:08
Static task
static1
Behavioral task
behavioral1
Sample
96c79780957f7a578c36e08190a67af62bbcac91867fcdadd6406132b53cebc0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96c79780957f7a578c36e08190a67af62bbcac91867fcdadd6406132b53cebc0.dll
Resource
win10v2004-20220812-en
General
-
Target
96c79780957f7a578c36e08190a67af62bbcac91867fcdadd6406132b53cebc0.dll
-
Size
228KB
-
MD5
20e150ae2a2ab17b8d7357e1dbf94bdd
-
SHA1
5fd984e31b7297374f7dd44c81ef6fd5f3b2ede0
-
SHA256
96c79780957f7a578c36e08190a67af62bbcac91867fcdadd6406132b53cebc0
-
SHA512
c711723b6ee8e66755cdd91bfc37538e1bf19290b8114ec0e35c32f6fba8cddb0bae0bba25bccf70b03031a2758d690f10374a0768e46d66da3a5cfd6b089b27
-
SSDEEP
3072:ZdcQ2ZNMSQvbajUTUItjT68+xQaaYujJpMvDHU:ZATSOjUQKTRYvbU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 448 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4860 4948 rundll32.exe 83 PID 4948 wrote to memory of 4860 4948 rundll32.exe 83 PID 4948 wrote to memory of 4860 4948 rundll32.exe 83 PID 4860 wrote to memory of 448 4860 rundll32.exe 84 PID 4860 wrote to memory of 448 4860 rundll32.exe 84 PID 4860 wrote to memory of 448 4860 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96c79780957f7a578c36e08190a67af62bbcac91867fcdadd6406132b53cebc0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96c79780957f7a578c36e08190a67af62bbcac91867fcdadd6406132b53cebc0.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:448
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD52e7df5ae9dcabe137166989493d996a9
SHA100a2f1abd5480d5e23bf512a8ee37aa842f69b54
SHA2564c53f34aa96dc64de964e0f440218ea918b4ac56576323edb4626b17265bd8ef
SHA51238bbc02e1767a8337ce53c73c637d4d9ec883d9f966dff26fb92ecda6d56646166deb5836a7edfd43725408f2e31f07935dbfaf726e6ea77c64ade18bad42d8f
-
Filesize
76KB
MD52e7df5ae9dcabe137166989493d996a9
SHA100a2f1abd5480d5e23bf512a8ee37aa842f69b54
SHA2564c53f34aa96dc64de964e0f440218ea918b4ac56576323edb4626b17265bd8ef
SHA51238bbc02e1767a8337ce53c73c637d4d9ec883d9f966dff26fb92ecda6d56646166deb5836a7edfd43725408f2e31f07935dbfaf726e6ea77c64ade18bad42d8f