Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
1defd596b615d3070fa7ea601884a56a1d28eee2ed57a091d7d60166095b4f64.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1defd596b615d3070fa7ea601884a56a1d28eee2ed57a091d7d60166095b4f64.dll
Resource
win10v2004-20220812-en
General
-
Target
1defd596b615d3070fa7ea601884a56a1d28eee2ed57a091d7d60166095b4f64.dll
-
Size
437KB
-
MD5
752d2b30cf69945cf365ef56b0633e70
-
SHA1
0a1e107db4f2d0ffb3e0b6d758ec2d28e0cd470d
-
SHA256
1defd596b615d3070fa7ea601884a56a1d28eee2ed57a091d7d60166095b4f64
-
SHA512
f63ef45ed0186f13536e0b74f05326e9976399ec3403f41ff2b40b50329535fc2d037a0ac3177150fe57ffcfe9418226c45363986bb583e3855ae9a2668c02f6
-
SSDEEP
6144:AO/AhcWoi8yw1NJEi1OrEduMuGbzIW4FmNiI8Gotpul3Z5X38xcL:AcAhcWotJ1NWvOTuG3WYNctMlp5cxcL
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 6 1360 rundll32.exe 8 1360 rundll32.exe 10 1360 rundll32.exe 11 1360 rundll32.exe 12 1360 rundll32.exe 13 1360 rundll32.exe 14 1360 rundll32.exe 15 1360 rundll32.exe 17 1360 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-7267-24 rundll32.exe File created C:\Windows\SysWOW64\032d2e rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1360 2020 rundll32.exe 16 PID 2020 wrote to memory of 1360 2020 rundll32.exe 16 PID 2020 wrote to memory of 1360 2020 rundll32.exe 16 PID 2020 wrote to memory of 1360 2020 rundll32.exe 16 PID 2020 wrote to memory of 1360 2020 rundll32.exe 16 PID 2020 wrote to memory of 1360 2020 rundll32.exe 16 PID 2020 wrote to memory of 1360 2020 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1defd596b615d3070fa7ea601884a56a1d28eee2ed57a091d7d60166095b4f64.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1defd596b615d3070fa7ea601884a56a1d28eee2ed57a091d7d60166095b4f64.dll,#12⤵
- Blocklisted process makes network request
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1360
-