Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0.dll
Resource
win10v2004-20220901-en
General
-
Target
a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0.dll
-
Size
212KB
-
MD5
1b33024b3e6bf5b2639a9e3b8c9867cb
-
SHA1
cef6f7ce4521dac6322c042d3068041cf9c4f630
-
SHA256
a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0
-
SHA512
bd6b117c0f469789307360d1a42748b655cacf88c309b2f3dac3ba061882ac954e05068b9a787f5aa91cae377bdb0280da16ef97c59f06ca728e660e6612e8d6
-
SSDEEP
3072:FVzirkuyGKcfS8IhHWDrxrMQGHCExD44K8iqBxLm1/LAICdISp8oCTcttccAN4/e:MbfS8I4D8j42hBxS1cIu3xtP/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Hgujofiwupucusez = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4556 rundll32.exe 4556 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 4556 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4992 wrote to memory of 4556 4992 rundll32.exe rundll32.exe PID 4992 wrote to memory of 4556 4992 rundll32.exe rundll32.exe PID 4992 wrote to memory of 4556 4992 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a030ed976ee714f06b70ae1f39d2488f5ebb24e76aae97f2c4a7d3fa37bf8bc0.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4556