Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2022, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
42154f2bf367b3381a2ed07ff07578e0f76131679fec79137f926849113eab98.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
42154f2bf367b3381a2ed07ff07578e0f76131679fec79137f926849113eab98.dll
Resource
win10v2004-20220901-en
General
-
Target
42154f2bf367b3381a2ed07ff07578e0f76131679fec79137f926849113eab98.dll
-
Size
288KB
-
MD5
3ab4a103290a5c8ee4f79c82321547a9
-
SHA1
481c63394a82bd369bf53bd658e3cea51e6936a1
-
SHA256
42154f2bf367b3381a2ed07ff07578e0f76131679fec79137f926849113eab98
-
SHA512
b7e1d3aafaa3bbea0729248cd6bd39174031a4938e41704d1bd98f99fd130b31c888f5b2fa9a66e2a961e1e5e91580683f2c2515fb1f2e49de715482a51a3fb7
-
SSDEEP
6144:wCYFfujhFCvTXGgvtzd/KEBP+mqMZ8C9ZoUzGAh:wCwWjhFbg1zcEl+mzfDuA
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4624 rundll32.exe Token: SeIncBasePriorityPrivilege 4624 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4624 4324 rundll32.exe 78 PID 4324 wrote to memory of 4624 4324 rundll32.exe 78 PID 4324 wrote to memory of 4624 4324 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42154f2bf367b3381a2ed07ff07578e0f76131679fec79137f926849113eab98.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42154f2bf367b3381a2ed07ff07578e0f76131679fec79137f926849113eab98.dll,#12⤵
- Checks BIOS information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4624
-