Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 18:53
Behavioral task
behavioral1
Sample
edfd77a78bf24ff8fa50c69eb4c4f418cfec336a5186f693ddbe556f54deb62c.dll
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
edfd77a78bf24ff8fa50c69eb4c4f418cfec336a5186f693ddbe556f54deb62c.dll
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
edfd77a78bf24ff8fa50c69eb4c4f418cfec336a5186f693ddbe556f54deb62c.dll
-
Size
114KB
-
MD5
0eac517192b995b8d5ebf10eb347406f
-
SHA1
cd71bd8ca471111cdee5b26f86392bcad282b55c
-
SHA256
edfd77a78bf24ff8fa50c69eb4c4f418cfec336a5186f693ddbe556f54deb62c
-
SHA512
e806fda3e8dee4b15c1d335f68ac4bcc28186f1208bc37187f707a0be5d05d99fae8a843755190f80d048aca027e83a86050798450914402e62b8aef44f227ec
-
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KNiCbmN:Mpl2GkGMkSgb8Svlu5KNON
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ewew2n5-0hdy-h1t8-0193-73o3aa61makf} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ewew2n5-0hdy-h1t8-0193-73o3aa61makf}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ewew2n5-0hdy-h1t8-0193-73o3aa61makf}\stubpath = "þÿÿÿX" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1260 1632 rundll32.exe 28 PID 1632 wrote to memory of 1260 1632 rundll32.exe 28 PID 1632 wrote to memory of 1260 1632 rundll32.exe 28 PID 1632 wrote to memory of 1260 1632 rundll32.exe 28 PID 1632 wrote to memory of 1260 1632 rundll32.exe 28 PID 1632 wrote to memory of 1260 1632 rundll32.exe 28 PID 1632 wrote to memory of 1260 1632 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edfd77a78bf24ff8fa50c69eb4c4f418cfec336a5186f693ddbe556f54deb62c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edfd77a78bf24ff8fa50c69eb4c4f418cfec336a5186f693ddbe556f54deb62c.dll,#12⤵
- Modifies Installed Components in the registry
PID:1260
-