Analysis
-
max time kernel
27s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
ed9981e17860c5c68f4e63610b2bea23ec2fd14f6aa64dce59b77fb6b47cb74e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed9981e17860c5c68f4e63610b2bea23ec2fd14f6aa64dce59b77fb6b47cb74e.dll
Resource
win10v2004-20220812-en
General
-
Target
ed9981e17860c5c68f4e63610b2bea23ec2fd14f6aa64dce59b77fb6b47cb74e.dll
-
Size
312KB
-
MD5
2256eaef6b2c21ab4ee463ca36109a61
-
SHA1
c7f6fa51865f2a9f7f475064642652bb674e79f6
-
SHA256
ed9981e17860c5c68f4e63610b2bea23ec2fd14f6aa64dce59b77fb6b47cb74e
-
SHA512
a770b59d8ba6ab5c3d868e1f11cbf6861b8b7b45373f453d1b6a9f80b2452f67c2c5fa6b1dd5d08d005cbb24edfa6d75734093280ccf5de8e00628aa8b663e36
-
SSDEEP
3072:QhrXgpanqX61IFlHguP4zuuqyJb4KwNf5792xv/XC4lqwkC2L/05BjAZ5IVL1MTn:ErRk6tuXhVGt5BwS1IZ5m9SK9o
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\fsrpknov = "{994EF40D-6316-4BA9-9294-5860B7B5EDBA}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{994EF40D-6316-4BA9-9294-5860B7B5EDBA}\InProcServer32\ = "C:\\Windows\\fsrpknov.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{994EF40D-6316-4BA9-9294-5860B7B5EDBA}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{994EF40D-6316-4BA9-9294-5860B7B5EDBA} rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 940 wrote to memory of 1960 940 rundll32.exe 28 PID 940 wrote to memory of 1960 940 rundll32.exe 28 PID 940 wrote to memory of 1960 940 rundll32.exe 28 PID 940 wrote to memory of 1960 940 rundll32.exe 28 PID 940 wrote to memory of 1960 940 rundll32.exe 28 PID 940 wrote to memory of 1960 940 rundll32.exe 28 PID 940 wrote to memory of 1960 940 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed9981e17860c5c68f4e63610b2bea23ec2fd14f6aa64dce59b77fb6b47cb74e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed9981e17860c5c68f4e63610b2bea23ec2fd14f6aa64dce59b77fb6b47cb74e.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1960
-