Analysis
-
max time kernel
146s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 00:47
Static task
static1
Behavioral task
behavioral1
Sample
591369_8379_WCDMA_V000001/M76XXUSNEKOLYM1050.elf
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral2
Sample
591369_8379_WCDMA_V000001/amss.mbn
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral3
Sample
591369_8379_WCDMA_V000001/qcsbl_USNEKOLYM.elf
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral4
Sample
lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral5
Sample
lpk.dll
Resource
win10v2004-20220812-en
General
-
Target
lpk.dll
-
Size
85KB
-
MD5
8f114be9125798a2e24ab55fafb09590
-
SHA1
aa070d571279542fe8c06a16f06afe6945d28d6e
-
SHA256
9a542bd4f4349030fcb8c557ce997be76a8f12c2bcf38a03dd918ff3f6c6a4e5
-
SHA512
b8cdcca1c5f9ae7701eaef596ff629e9febd3e3929c05aba62602821f311fd4edce8924576ff07dc6ed7094a7992e60bc44bbf9f7b9289bed21c97a41587201d
-
SSDEEP
1536:0O3H4UYT7knSEUHAC4H3Pt9tyHpO3H4UYn:RX4Uo7kSEdzXPtPyHsX4Uo
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2040 hrl8FE1.tmp 4984 iaoqau.exe -
Loads dropped DLL 1 IoCs
pid Process 4984 iaoqau.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\hra33.dll iaoqau.exe File created C:\Windows\SysWOW64\iaoqau.exe hrl8FE1.tmp File opened for modification C:\Windows\SysWOW64\iaoqau.exe hrl8FE1.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 4336 2040 hrl8FE1.tmp 82 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2944 wrote to memory of 1748 2944 rundll32.exe 79 PID 2944 wrote to memory of 1748 2944 rundll32.exe 79 PID 2944 wrote to memory of 1748 2944 rundll32.exe 79 PID 1748 wrote to memory of 2040 1748 rundll32.exe 80 PID 1748 wrote to memory of 2040 1748 rundll32.exe 80 PID 1748 wrote to memory of 2040 1748 rundll32.exe 80 PID 2040 wrote to memory of 4336 2040 hrl8FE1.tmp 82 PID 2040 wrote to memory of 4336 2040 hrl8FE1.tmp 82 PID 2040 wrote to memory of 4336 2040 hrl8FE1.tmp 82 PID 2040 wrote to memory of 4336 2040 hrl8FE1.tmp 82 PID 2040 wrote to memory of 4336 2040 hrl8FE1.tmp 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\hrl8FE1.tmpC:\Users\Admin\AppData\Local\Temp\hrl8FE1.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\calc.execalc.exe4⤵PID:4336
-
-
-
-
C:\Windows\SysWOW64\iaoqau.exeC:\Windows\SysWOW64\iaoqau.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4984
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
85KB
MD58f114be9125798a2e24ab55fafb09590
SHA1aa070d571279542fe8c06a16f06afe6945d28d6e
SHA2569a542bd4f4349030fcb8c557ce997be76a8f12c2bcf38a03dd918ff3f6c6a4e5
SHA512b8cdcca1c5f9ae7701eaef596ff629e9febd3e3929c05aba62602821f311fd4edce8924576ff07dc6ed7094a7992e60bc44bbf9f7b9289bed21c97a41587201d
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e