Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
8b3577485361eab681759d83c3509594adab20527480503a30be2fd78a48e317.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b3577485361eab681759d83c3509594adab20527480503a30be2fd78a48e317.dll
Resource
win10v2004-20220812-en
General
-
Target
8b3577485361eab681759d83c3509594adab20527480503a30be2fd78a48e317.dll
-
Size
24KB
-
MD5
93a8deb4b376f2dbe5d0331e40803f30
-
SHA1
204d5faf51c268f595c5c181358c78038ef23368
-
SHA256
8b3577485361eab681759d83c3509594adab20527480503a30be2fd78a48e317
-
SHA512
9e943c3269f32c60bae24580ac1d4010760ada8246020d94634a7d1f689b3e911ce87db45aad540ee4b4c62326912a7905bc269a97f92a7afd65b7fe50efdc21
-
SSDEEP
768:/pARBR4lSi7mEkZPRrx6IBepJrtDwGI39xE:/SmoqvkJRrQjFt2x
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27 PID 1672 wrote to memory of 1724 1672 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b3577485361eab681759d83c3509594adab20527480503a30be2fd78a48e317.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b3577485361eab681759d83c3509594adab20527480503a30be2fd78a48e317.dll,#12⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:1724
-