Analysis
-
max time kernel
198s -
max time network
208s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll
Resource
win10v2004-20221111-en
General
-
Target
6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll
-
Size
48KB
-
MD5
45925067afcbe7d0c0c11f827f0e8ff0
-
SHA1
eabc6f08fb08ee28fc277311b223f63936ad124b
-
SHA256
6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8
-
SHA512
6e4c096c7ef01b8b84efc62fc2d8caa3573ad841e8f7ee2d60ac49cb48dbcdd55f825f88e274692ee2b9447c1a2225256d6cd7abb6a81d5e5f5f43c89ccb0afa
-
SSDEEP
768:hojY9PdJdMmJyj0Ml+oi/XSpSZbVfDQoWyHaojY9PoK:0mFJdMmJyDl+tVZioWyHjmgK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 768 hrlF4FA.tmp 1164 kequas.exe -
Loads dropped DLL 3 IoCs
pid Process 944 rundll32.exe 944 rundll32.exe 1164 kequas.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: kequas.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\N: kequas.exe File opened (read-only) \??\T: kequas.exe File opened (read-only) \??\U: kequas.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\F: kequas.exe File opened (read-only) \??\L: kequas.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\S: kequas.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\G: kequas.exe File opened (read-only) \??\I: kequas.exe File opened (read-only) \??\J: kequas.exe File opened (read-only) \??\P: kequas.exe File opened (read-only) \??\X: kequas.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\Z: kequas.exe File opened (read-only) \??\Y: kequas.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\E: kequas.exe File opened (read-only) \??\H: kequas.exe File opened (read-only) \??\O: kequas.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\K: kequas.exe File opened (read-only) \??\M: kequas.exe File opened (read-only) \??\Q: kequas.exe File opened (read-only) \??\V: kequas.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\W: kequas.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kequas.exe hrlF4FA.tmp File opened for modification C:\Windows\SysWOW64\kequas.exe hrlF4FA.tmp File created C:\Windows\SysWOW64\hra33.dll kequas.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\7-Zip\lpk.dll kequas.exe File opened for modification C:\Program Files\7-Zip\lpk.dll kequas.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 768 hrlF4FA.tmp 768 hrlF4FA.tmp 1164 kequas.exe 1164 kequas.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 1320 wrote to memory of 944 1320 rundll32.exe 28 PID 944 wrote to memory of 768 944 rundll32.exe 29 PID 944 wrote to memory of 768 944 rundll32.exe 29 PID 944 wrote to memory of 768 944 rundll32.exe 29 PID 944 wrote to memory of 768 944 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll,#12⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\hrlF4FA.tmpC:\Users\Admin\AppData\Local\Temp\hrlF4FA.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:768
-
-
-
C:\Windows\SysWOW64\kequas.exeC:\Windows\SysWOW64\kequas.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5f0f40c080b0c9ac85edc1c147d99880f
SHA120d73c8122fa41fc2b2e084768792fc8670039d6
SHA25613b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8
SHA512b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654
-
Filesize
38KB
MD5f0f40c080b0c9ac85edc1c147d99880f
SHA120d73c8122fa41fc2b2e084768792fc8670039d6
SHA25613b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8
SHA512b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654
-
Filesize
38KB
MD5f0f40c080b0c9ac85edc1c147d99880f
SHA120d73c8122fa41fc2b2e084768792fc8670039d6
SHA25613b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8
SHA512b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654
-
Filesize
38KB
MD5f0f40c080b0c9ac85edc1c147d99880f
SHA120d73c8122fa41fc2b2e084768792fc8670039d6
SHA25613b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8
SHA512b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654
-
Filesize
38KB
MD5f0f40c080b0c9ac85edc1c147d99880f
SHA120d73c8122fa41fc2b2e084768792fc8670039d6
SHA25613b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8
SHA512b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654
-
Filesize
38KB
MD5f0f40c080b0c9ac85edc1c147d99880f
SHA120d73c8122fa41fc2b2e084768792fc8670039d6
SHA25613b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8
SHA512b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654
-
Filesize
46KB
MD5340b3c849e4ae75e027b40e179522181
SHA15b95d15a903f2be144f84d6f1261817bd85ccb8e
SHA2565e7dd39c1522a620f9a85def5b573b9ba7cda8e14e4a4bc1d48578c2ba70dd29
SHA5121c56ecd4c408536b26456959d9e98ad81618ba526aba7c277028b187818a058239be7198a9f417f90a3390c2c3a33c462fcd355ad613a82655e6caba79469157