Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 12:02
Static task
static1
Behavioral task
behavioral1
Sample
ce3e932213914f5cebf3e48e4a2130f59bc33cd795574a41762d4de709090cd8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ce3e932213914f5cebf3e48e4a2130f59bc33cd795574a41762d4de709090cd8.dll
Resource
win10v2004-20220812-en
General
-
Target
ce3e932213914f5cebf3e48e4a2130f59bc33cd795574a41762d4de709090cd8.dll
-
Size
24KB
-
MD5
9259a8d8eea2be537a5ce0b468ca60b2
-
SHA1
68d83aa4810831fd36ff3a5477ccb551de2f7cb4
-
SHA256
ce3e932213914f5cebf3e48e4a2130f59bc33cd795574a41762d4de709090cd8
-
SHA512
f4b2f80cdd7a124f0b44c424521895553e029b749a70ced2509236fe320887d91366bc80540a5a5958fb37b4f1c0435ae7ce569efd4cce6b1ad4ad5b22d85032
-
SSDEEP
384:/pWdYZyMKcg4oyCSwj1haxzjmlPvxI6LziNClWmzceOA5yWN21aTSzu839xpOc:/pARBR4lwYKdnlWteOG2339xE
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 828 1200 rundll32.exe 27 PID 1200 wrote to memory of 828 1200 rundll32.exe 27 PID 1200 wrote to memory of 828 1200 rundll32.exe 27 PID 1200 wrote to memory of 828 1200 rundll32.exe 27 PID 1200 wrote to memory of 828 1200 rundll32.exe 27 PID 1200 wrote to memory of 828 1200 rundll32.exe 27 PID 1200 wrote to memory of 828 1200 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce3e932213914f5cebf3e48e4a2130f59bc33cd795574a41762d4de709090cd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce3e932213914f5cebf3e48e4a2130f59bc33cd795574a41762d4de709090cd8.dll,#12⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:828
-