Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8.dll
Resource
win10v2004-20220812-en
General
-
Target
590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8.dll
-
Size
216KB
-
MD5
b3d8c389faee6ef3507bd47e74d5cf2a
-
SHA1
267826a019a0c87f410965100a82672d970540d5
-
SHA256
590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8
-
SHA512
400bf7b09ac0dca9e12827ccd3523ffe1e644a01d3b2de7d718b3ba2845df9e1178c76fe17ed11f007cceb7f393b590782d7f46b62dfa9bd033aa4ba653785aa
-
SSDEEP
6144:6l0qm7laLktIiwdCj2KAq/ZI77ABaNryapD7f:G0q4wPsZCMMycD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Pcamufep = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1204 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1204 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe PID 1280 wrote to memory of 1204 1280 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\590139324012438c7a58077aa5032be009299462865b4e0d733acf60c63155b8.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1204