Analysis
-
max time kernel
13s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:38
Behavioral task
behavioral1
Sample
c575776b81298467efd9a9f160cf8e7488b02be5a4f1431a8d72beb8dcc8eb51.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c575776b81298467efd9a9f160cf8e7488b02be5a4f1431a8d72beb8dcc8eb51.dll
Resource
win10v2004-20220901-en
General
-
Target
c575776b81298467efd9a9f160cf8e7488b02be5a4f1431a8d72beb8dcc8eb51.dll
-
Size
2.1MB
-
MD5
73882d3f4448ff1605f06d20b1b14024
-
SHA1
4d3183b5d91cd22a66476e6ec4c0472c367b8254
-
SHA256
c575776b81298467efd9a9f160cf8e7488b02be5a4f1431a8d72beb8dcc8eb51
-
SHA512
9665adedb71a9e867ffa9c6709e1a25169152d63aa5c624fbced7bb16930812ccef8dfde5eb02e9a65f2daad281c2f040ecb8577facf8434c463b16d38e461f6
-
SSDEEP
24576:zvYW1jtpvrHPdDcVAu28I2IbYJzJQ0mSaiIxbTSaIZ9Cg7p9kBZv1qw1UykPJBo:cDV7uSai9pRkBZvg8UyGo
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1516-56-0x0000000010000000-0x0000000010251000-memory.dmp vmprotect behavioral1/memory/1516-57-0x0000000010000000-0x0000000010251000-memory.dmp vmprotect behavioral1/memory/1516-58-0x0000000010000000-0x0000000010251000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 1516 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1516 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe PID 1552 wrote to memory of 1516 1552 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c575776b81298467efd9a9f160cf8e7488b02be5a4f1431a8d72beb8dcc8eb51.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c575776b81298467efd9a9f160cf8e7488b02be5a4f1431a8d72beb8dcc8eb51.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1516-54-0x0000000000000000-mapping.dmp
-
memory/1516-55-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1516-56-0x0000000010000000-0x0000000010251000-memory.dmpFilesize
2.3MB
-
memory/1516-57-0x0000000010000000-0x0000000010251000-memory.dmpFilesize
2.3MB
-
memory/1516-58-0x0000000010000000-0x0000000010251000-memory.dmpFilesize
2.3MB