Analysis
-
max time kernel
148s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 13:18
Static task
static1
Behavioral task
behavioral1
Sample
9cdd65c79921a2dd62616ab5b94dcd7123d13038fc097627f91162e4d9a3db5c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9cdd65c79921a2dd62616ab5b94dcd7123d13038fc097627f91162e4d9a3db5c.dll
Resource
win10v2004-20220901-en
General
-
Target
9cdd65c79921a2dd62616ab5b94dcd7123d13038fc097627f91162e4d9a3db5c.dll
-
Size
667KB
-
MD5
a086e03be718ed752d880d21ab9cdb50
-
SHA1
3d720f928d9791696365bfc19d0bdc4ca371c55e
-
SHA256
9cdd65c79921a2dd62616ab5b94dcd7123d13038fc097627f91162e4d9a3db5c
-
SHA512
1c73e1170f2c438cf18fdcf586b4bde3afaf98c013554000f33ca0e7e276aa3c3b521b281a012fe4848dbe5902bb512c2c6ae5ad8d16c929c810155c82e95ee5
-
SSDEEP
12288:bzb9rMfc+CKUQyUmjtc4euuzPrs9pGp8hunWoopooK9kwP:bzb1MlCKUQyUmjtczu6Prs9pgWoopoo6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 884 rundll32Srv.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/memory/884-63-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/884-65-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1020 rundll32.exe 1020 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\RMNetwork\px2243.tmp rundll32Srv.exe File opened for modification C:\Program Files (x86)\RMNetwork\pxB4E2.tmp rundll32Srv.exe File opened for modification C:\Program Files (x86)\RMNetwork\px4253.tmp rundll32Srv.exe File opened for modification C:\Program Files (x86)\RMNetwork\px312F.tmp rundll32Srv.exe File opened for modification C:\Program Files (x86)\RMNetwork\pxAA07.tmp rundll32Srv.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1176 wrote to memory of 1020 1176 rundll32.exe 27 PID 1020 wrote to memory of 884 1020 rundll32.exe 28 PID 1020 wrote to memory of 884 1020 rundll32.exe 28 PID 1020 wrote to memory of 884 1020 rundll32.exe 28 PID 1020 wrote to memory of 884 1020 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cdd65c79921a2dd62616ab5b94dcd7123d13038fc097627f91162e4d9a3db5c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cdd65c79921a2dd62616ab5b94dcd7123d13038fc097627f91162e4d9a3db5c.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:884
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD59f7f94a22e1ed7f03995292038b35b98
SHA1c4c5a6e26687e788b3a0859aa0e6f1917a7334c2
SHA256a7a43eef41b32a366e865ca71c160ff23e831cce9a28937ff7cd212acd2109e3
SHA512f775bbddc1f594984c5f7d7b88d211d5ddbd54d2fed1c92ae11b5007f6ef3e00b614f729253c77b8f1471b328dbd6be585309414b4310f0c2840dedb9a743bb4
-
Filesize
10KB
MD59f7f94a22e1ed7f03995292038b35b98
SHA1c4c5a6e26687e788b3a0859aa0e6f1917a7334c2
SHA256a7a43eef41b32a366e865ca71c160ff23e831cce9a28937ff7cd212acd2109e3
SHA512f775bbddc1f594984c5f7d7b88d211d5ddbd54d2fed1c92ae11b5007f6ef3e00b614f729253c77b8f1471b328dbd6be585309414b4310f0c2840dedb9a743bb4
-
Filesize
10KB
MD59f7f94a22e1ed7f03995292038b35b98
SHA1c4c5a6e26687e788b3a0859aa0e6f1917a7334c2
SHA256a7a43eef41b32a366e865ca71c160ff23e831cce9a28937ff7cd212acd2109e3
SHA512f775bbddc1f594984c5f7d7b88d211d5ddbd54d2fed1c92ae11b5007f6ef3e00b614f729253c77b8f1471b328dbd6be585309414b4310f0c2840dedb9a743bb4
-
Filesize
10KB
MD59f7f94a22e1ed7f03995292038b35b98
SHA1c4c5a6e26687e788b3a0859aa0e6f1917a7334c2
SHA256a7a43eef41b32a366e865ca71c160ff23e831cce9a28937ff7cd212acd2109e3
SHA512f775bbddc1f594984c5f7d7b88d211d5ddbd54d2fed1c92ae11b5007f6ef3e00b614f729253c77b8f1471b328dbd6be585309414b4310f0c2840dedb9a743bb4