Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
62b885718ceb19c8605428bb83802b539f76dd9382421a9ff3da93da00dcb8cc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
62b885718ceb19c8605428bb83802b539f76dd9382421a9ff3da93da00dcb8cc.dll
Resource
win10v2004-20220901-en
General
-
Target
62b885718ceb19c8605428bb83802b539f76dd9382421a9ff3da93da00dcb8cc.dll
-
Size
100KB
-
MD5
a16abfa25b8565663f15468903fc6572
-
SHA1
9e9ca4537bd735bb46e1b132507199a8ad2914a4
-
SHA256
62b885718ceb19c8605428bb83802b539f76dd9382421a9ff3da93da00dcb8cc
-
SHA512
130630e40256037ec0cee2f954ea97b79cef7f598c47f918888a562dcb8d479c640ab39eadcf3066ba74441ae426e5b6cbc6b0a390062b2571216ff0c0d789d1
-
SSDEEP
1536:1wsQqzozCVE4ybCsbycX0erTfFkWGq6cjTAc:1wsLzDVE4yvierTdkWGqzjTAc
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 840 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1376 wrote to memory of 840 1376 rundll32.exe 26 PID 1376 wrote to memory of 840 1376 rundll32.exe 26 PID 1376 wrote to memory of 840 1376 rundll32.exe 26 PID 1376 wrote to memory of 840 1376 rundll32.exe 26 PID 1376 wrote to memory of 840 1376 rundll32.exe 26 PID 1376 wrote to memory of 840 1376 rundll32.exe 26 PID 1376 wrote to memory of 840 1376 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62b885718ceb19c8605428bb83802b539f76dd9382421a9ff3da93da00dcb8cc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62b885718ceb19c8605428bb83802b539f76dd9382421a9ff3da93da00dcb8cc.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:840
-