Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 05:05
Behavioral task
behavioral1
Sample
38e00c9711bed2817a339f2f31331aff228890741a92bcc55dfe29cb2cc4d0ef.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
38e00c9711bed2817a339f2f31331aff228890741a92bcc55dfe29cb2cc4d0ef.dll
Resource
win10v2004-20221111-en
General
-
Target
38e00c9711bed2817a339f2f31331aff228890741a92bcc55dfe29cb2cc4d0ef.dll
-
Size
12KB
-
MD5
67b9d09134d7df3e3dd1ee35f60a6d4d
-
SHA1
45eda1306d62b6799d1ba8baca1be2afae2a9e95
-
SHA256
38e00c9711bed2817a339f2f31331aff228890741a92bcc55dfe29cb2cc4d0ef
-
SHA512
da5a8105156a87dd677894a5f73a000329c08106af2477b3052b780c3c8523b244725aca690d1490590e24c3bb0bc0efa5a37e19fb3d737af468862223c60b6e
-
SSDEEP
384:9hF6VogOxpjamJoww60CCdUiSA/Xf8ygIJx7ShE:rES9jDql7XZgIum
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2044 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\aksuser.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\aksuser.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2044 1184 rundll32.exe 27 PID 1184 wrote to memory of 2044 1184 rundll32.exe 27 PID 1184 wrote to memory of 2044 1184 rundll32.exe 27 PID 1184 wrote to memory of 2044 1184 rundll32.exe 27 PID 1184 wrote to memory of 2044 1184 rundll32.exe 27 PID 1184 wrote to memory of 2044 1184 rundll32.exe 27 PID 1184 wrote to memory of 2044 1184 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38e00c9711bed2817a339f2f31331aff228890741a92bcc55dfe29cb2cc4d0ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38e00c9711bed2817a339f2f31331aff228890741a92bcc55dfe29cb2cc4d0ef.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:2044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59c67f6bbda3881cfd02095160cf91576
SHA180de7475e91692dc5bead2cac98f74c1073cd93e
SHA2566ce97c6f0ad8be183de935a7aab7d46821e8de9e55a4bff54acb49d056826a94
SHA512eebbd6d0d4f50fbb8ee9e9a7976d06fb6796cce657187c8a1254ca1cf5040ec39cc5b4faed6a8bf79d38e051c9de46b87c38e2318704ae4bef2c2a50e06004d2