Analysis
-
max time kernel
152s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll
Resource
win10v2004-20220812-en
General
-
Target
a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll
-
Size
214KB
-
MD5
9ff0b0556ec293992264f1a5332dc74c
-
SHA1
5d676a1262335fef80442c82b1d11f4c7552952c
-
SHA256
a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b
-
SHA512
3d3a805199898130137001202890347009e7c9d9c31dea43e3ae59767c76622f63c550d9677aeea8f434fbb179882e9a85978552737f881a243b0372fd168a1f
-
SSDEEP
3072:VKomBsj+/XgWrtNgpI2ll8FZHj5nQFvc8UbWgoUV9E5lAuDHEAUFqNMH+t4SL8RJ:VoGWriIwqlAvHU/EPDvUFqe+R9Z9WIYZ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ñ--6499-91-46 rundll32.exe File created C:\Windows\SysWOW64\46c5 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 740 wrote to memory of 2008 740 rundll32.exe 27 PID 740 wrote to memory of 2008 740 rundll32.exe 27 PID 740 wrote to memory of 2008 740 rundll32.exe 27 PID 740 wrote to memory of 2008 740 rundll32.exe 27 PID 740 wrote to memory of 2008 740 rundll32.exe 27 PID 740 wrote to memory of 2008 740 rundll32.exe 27 PID 740 wrote to memory of 2008 740 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2008
-