Analysis
-
max time kernel
201s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 04:35
Static task
static1
Behavioral task
behavioral1
Sample
dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll
Resource
win10v2004-20221111-en
General
-
Target
dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll
-
Size
1.2MB
-
MD5
060bb618093684db155e3528315786d5
-
SHA1
2ae1679e288e4feb300abf8d4deee39c71f5a502
-
SHA256
dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7
-
SHA512
913005d2396199aef82402d435172d92c514461363a32fbadbda0a32caf1aa91a1eba6d26841f0cdfaf42d8594e9ac6123be8ae55c26e5d9b8d0a6cc342d3c66
-
SSDEEP
24576:iMIb0Zy9CbcEfV2jMotMDu0dAGly0vFV72daMHEoe8Bhx:iMm0+C4EBru0uGttV72daMHd1j
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 300 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hknms.sys rundll32.exe File created C:\Windows\SysWOW64\winio.vxd rundll32.exe File created C:\Windows\SysWOW64\WinIo.dll rundll32.exe File created C:\Windows\SysWOW64\hknms.sys rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 300 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 568 wrote to memory of 300 568 rundll32.exe 28 PID 568 wrote to memory of 300 568 rundll32.exe 28 PID 568 wrote to memory of 300 568 rundll32.exe 28 PID 568 wrote to memory of 300 568 rundll32.exe 28 PID 568 wrote to memory of 300 568 rundll32.exe 28 PID 568 wrote to memory of 300 568 rundll32.exe 28 PID 568 wrote to memory of 300 568 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc4c39f3ce71618813a790ee1d9a732571d058e15e64170ff7598007dac609e7.dll,#12⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b3b6289999a2762c7da8104e5f47f7ee
SHA1ea3bb66a6de13d86bd40a3005374d4cc9bbb1520
SHA25673663dff8f7ac6ee85f9a7eeca762b002ee615c03b110e0bb64fc69f7b462565
SHA512364d476f71df9b881c34687482e8524a23eaa95bfee5b799c98eaf633880e92ee11a1dbdeeddc3f2e00a8b9cddcb937d3f1b126091d65c2cf4f4e87bafd0d6e5