Analysis
-
max time kernel
139s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465.dll
Resource
win10v2004-20220812-en
General
-
Target
ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465.dll
-
Size
19KB
-
MD5
04b211d5782800badd22a5957f957c94
-
SHA1
3ebb1012cecc1251de19a377d5c5a676dfd719e2
-
SHA256
ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465
-
SHA512
503ee19d10d8b5cc48a456fbed2949770cfc096af0aa46ea74a5999b90e89875b41120d30b6c42d2ec0b6efe2e0876a352c4d9370dfd1f33926374abaa914078
-
SSDEEP
384:bWYdMCPMbvso6uDp1rFMnvRc0dYhWd0VCIbJo8YFGqP5vXWvwWocwoCm:KYdMCPMbvso5t1q5c0dVdYCIRYFp5vc6
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\MgicRc.sys rundll32.exe File opened for modification C:\Windows\SysWOW64\drivers\MgicRc.sys svchost.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\sys64.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 880 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sys64.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\sys64.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1228 1160 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1160 rundll32.exe 1160 rundll32.exe 880 svchost.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 748 wrote to memory of 1160 748 rundll32.exe 28 PID 1160 wrote to memory of 1228 1160 rundll32.exe 30 PID 1160 wrote to memory of 1228 1160 rundll32.exe 30 PID 1160 wrote to memory of 1228 1160 rundll32.exe 30 PID 1160 wrote to memory of 1228 1160 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465.dll,#12⤵
- Drops file in Drivers directory
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 2643⤵
- Program crash
PID:1228
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5058bf2e0728e3d36308bf49ca10b9072
SHA1ed9ca10d9ca36c94f065401c0c6ee5573a7f7de6
SHA2569a5ae5bf51913d9c8e84dae09636d09b83359547cc9efd7acaa5e13ec6e9bf70
SHA512e3ceadf9a09c2df7af451a7bc53c8d2419e3c94e478ad02436fbdec661304713a86c86780a6361a01ee2afece1917b92e5043580e2e697eaf05a73fb18fd26c2
-
Filesize
19KB
MD504b211d5782800badd22a5957f957c94
SHA13ebb1012cecc1251de19a377d5c5a676dfd719e2
SHA256ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465
SHA512503ee19d10d8b5cc48a456fbed2949770cfc096af0aa46ea74a5999b90e89875b41120d30b6c42d2ec0b6efe2e0876a352c4d9370dfd1f33926374abaa914078
-
Filesize
19KB
MD504b211d5782800badd22a5957f957c94
SHA13ebb1012cecc1251de19a377d5c5a676dfd719e2
SHA256ec77e47addd1b2ac9318306f6ebadc0473daa1cd1595a8e207fb62104e06d465
SHA512503ee19d10d8b5cc48a456fbed2949770cfc096af0aa46ea74a5999b90e89875b41120d30b6c42d2ec0b6efe2e0876a352c4d9370dfd1f33926374abaa914078