Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 00:47
Static task
static1
Behavioral task
behavioral1
Sample
591369_8379_WCDMA_V000001/M76XXUSNEKOLYM1050.elf
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral2
Sample
591369_8379_WCDMA_V000001/amss.mbn
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral3
Sample
591369_8379_WCDMA_V000001/qcsbl_USNEKOLYM.elf
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral4
Sample
lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral5
Sample
lpk.dll
Resource
win10v2004-20220812-en
General
-
Target
lpk.dll
-
Size
85KB
-
MD5
8f114be9125798a2e24ab55fafb09590
-
SHA1
aa070d571279542fe8c06a16f06afe6945d28d6e
-
SHA256
9a542bd4f4349030fcb8c557ce997be76a8f12c2bcf38a03dd918ff3f6c6a4e5
-
SHA512
b8cdcca1c5f9ae7701eaef596ff629e9febd3e3929c05aba62602821f311fd4edce8924576ff07dc6ed7094a7992e60bc44bbf9f7b9289bed21c97a41587201d
-
SSDEEP
1536:0O3H4UYT7knSEUHAC4H3Pt9tyHpO3H4UYn:RX4Uo7kSEdzXPtPyHsX4Uo
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1772 hrl20F9.tmp 1108 gemuas.exe -
Loads dropped DLL 3 IoCs
pid Process 1452 rundll32.exe 1452 rundll32.exe 1108 gemuas.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: gemuas.exe File opened (read-only) \??\S: gemuas.exe File opened (read-only) \??\W: gemuas.exe File opened (read-only) \??\Z: gemuas.exe File opened (read-only) \??\F: gemuas.exe File opened (read-only) \??\M: gemuas.exe File opened (read-only) \??\Q: gemuas.exe File opened (read-only) \??\U: gemuas.exe File opened (read-only) \??\L: gemuas.exe File opened (read-only) \??\R: gemuas.exe File opened (read-only) \??\T: gemuas.exe File opened (read-only) \??\Y: gemuas.exe File opened (read-only) \??\G: gemuas.exe File opened (read-only) \??\I: gemuas.exe File opened (read-only) \??\J: gemuas.exe File opened (read-only) \??\K: gemuas.exe File opened (read-only) \??\V: gemuas.exe File opened (read-only) \??\X: gemuas.exe File opened (read-only) \??\E: gemuas.exe File opened (read-only) \??\N: gemuas.exe File opened (read-only) \??\O: gemuas.exe File opened (read-only) \??\P: gemuas.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\hra33.dll gemuas.exe File created C:\Windows\SysWOW64\gemuas.exe hrl20F9.tmp File opened for modification C:\Windows\SysWOW64\gemuas.exe hrl20F9.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1772 set thread context of 2036 1772 hrl20F9.tmp 31 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 gemuas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz gemuas.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1972 wrote to memory of 1452 1972 rundll32.exe 28 PID 1452 wrote to memory of 1772 1452 rundll32.exe 29 PID 1452 wrote to memory of 1772 1452 rundll32.exe 29 PID 1452 wrote to memory of 1772 1452 rundll32.exe 29 PID 1452 wrote to memory of 1772 1452 rundll32.exe 29 PID 1772 wrote to memory of 2036 1772 hrl20F9.tmp 31 PID 1772 wrote to memory of 2036 1772 hrl20F9.tmp 31 PID 1772 wrote to memory of 2036 1772 hrl20F9.tmp 31 PID 1772 wrote to memory of 2036 1772 hrl20F9.tmp 31 PID 1772 wrote to memory of 2036 1772 hrl20F9.tmp 31 PID 1772 wrote to memory of 2036 1772 hrl20F9.tmp 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\hrl20F9.tmpC:\Users\Admin\AppData\Local\Temp\hrl20F9.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\calc.execalc.exe4⤵PID:2036
-
-
-
-
C:\Windows\SysWOW64\gemuas.exeC:\Windows\SysWOW64\gemuas.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Checks processor information in registry
PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
85KB
MD58f114be9125798a2e24ab55fafb09590
SHA1aa070d571279542fe8c06a16f06afe6945d28d6e
SHA2569a542bd4f4349030fcb8c557ce997be76a8f12c2bcf38a03dd918ff3f6c6a4e5
SHA512b8cdcca1c5f9ae7701eaef596ff629e9febd3e3929c05aba62602821f311fd4edce8924576ff07dc6ed7094a7992e60bc44bbf9f7b9289bed21c97a41587201d