Analysis
-
max time kernel
31s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll
Resource
win10v2004-20220901-en
General
-
Target
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll
-
Size
384KB
-
MD5
44da9f4aaf7026e305516d93c8aa3685
-
SHA1
1de6e4eea9115605b1b1bdd094626f6d89eec9b2
-
SHA256
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a
-
SHA512
0ddaf60b5d399e2611c4487e4ab44a9b235218ab40e6a9f68e1749b742a4b70708569f8a6a076c758ce2406daf630c64d6620b51a78b74996db635c94dc2355a
-
SSDEEP
6144:4ZFeM1qzrxv1pybOoFUCCBcgaFbcgIRO9:4nT1sv1pJFmga1c
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1536 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\winsieprotect.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1536 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1536 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27 PID 908 wrote to memory of 1536 908 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5dc2895181a95f1ca38008d8407c241a1
SHA1d0905cf80244412b60d70f733aa8ab6cb3e70d3b
SHA2563cdd92c9993b37661fd3ae5f766abcfa4e6d337d9a514a7d63a726ea9b7d4fb5
SHA512aec16bdd96c552f7aabd9277212bf1900ab7ffd54c4bb46a0eb7aa9e2425b0d090179f10c2f1a0a0c5f4cb36209047aad60d46927ee6bd10980e4220a28838cc