Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
74b1596432f4075f25dd7c132471e6b65b4b252c342460109b3f0d9e64df8af1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74b1596432f4075f25dd7c132471e6b65b4b252c342460109b3f0d9e64df8af1.dll
Resource
win10v2004-20220812-en
General
-
Target
74b1596432f4075f25dd7c132471e6b65b4b252c342460109b3f0d9e64df8af1.dll
-
Size
244KB
-
MD5
20eaf5662616e5cc2c1cb96f633bfa30
-
SHA1
aa1a8ee028a605bb81179946920bc0e6284f79f8
-
SHA256
74b1596432f4075f25dd7c132471e6b65b4b252c342460109b3f0d9e64df8af1
-
SHA512
c14a49ef7bbf9ea6f2236c5fad6e8f584509d0195a74f1323873b842cd73e052a07104a26c4499581b4a16d6171a85cdcd292085a98af5ec6c59fb472c82b4b7
-
SSDEEP
768:kiVSPiFnFaRvuHQY1orkv6C+AqPo7F2szijPBBQARQkolWklp:pS4aEHQax2szijPBBQARUl
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{7581927D-D4CC-4F04-AAAD-0BFB04AE9907}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{3BAEA6D0-9421-4E3A-9455-078ECB29A0D3}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1564 1152 rundll32.exe 75 PID 1152 wrote to memory of 1564 1152 rundll32.exe 75 PID 1152 wrote to memory of 1564 1152 rundll32.exe 75
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74b1596432f4075f25dd7c132471e6b65b4b252c342460109b3f0d9e64df8af1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74b1596432f4075f25dd7c132471e6b65b4b252c342460109b3f0d9e64df8af1.dll,#12⤵PID:1564
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3108