Analysis
-
max time kernel
155s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934.dll
Resource
win10v2004-20221111-en
General
-
Target
e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934.dll
-
Size
105KB
-
MD5
0006f47ddbf902e35dc4a6895773b800
-
SHA1
bc890a9c6d5ac84f6a10d991a64a9a36731d7dba
-
SHA256
e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934
-
SHA512
c18b47420cf1cf5806a3608501cea6970a26fb7dd4ab44d2316faae7bfb7c1670cb2c0eab316868d846efa3b9c1bb70706a5efb4924bc75e11031385c7430b00
-
SSDEEP
1536:ljWsawWtjJTwS9euQnTPFFrNLRIO2lnToIfz/Bk:1+JTYumTvN72NTBfzZk
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\3800hk\Parameters\ServiceDll = "C:\\Windows\\system32\\3800hk.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1172 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\3800hk.dll rundll32.exe File created C:\Windows\SysWOW64\3800hk.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1308 wrote to memory of 888 1308 rundll32.exe 28 PID 1308 wrote to memory of 888 1308 rundll32.exe 28 PID 1308 wrote to memory of 888 1308 rundll32.exe 28 PID 1308 wrote to memory of 888 1308 rundll32.exe 28 PID 1308 wrote to memory of 888 1308 rundll32.exe 28 PID 1308 wrote to memory of 888 1308 rundll32.exe 28 PID 1308 wrote to memory of 888 1308 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:888
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD50006f47ddbf902e35dc4a6895773b800
SHA1bc890a9c6d5ac84f6a10d991a64a9a36731d7dba
SHA256e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934
SHA512c18b47420cf1cf5806a3608501cea6970a26fb7dd4ab44d2316faae7bfb7c1670cb2c0eab316868d846efa3b9c1bb70706a5efb4924bc75e11031385c7430b00
-
Filesize
105KB
MD50006f47ddbf902e35dc4a6895773b800
SHA1bc890a9c6d5ac84f6a10d991a64a9a36731d7dba
SHA256e2d4e07b60f45eeabdd922e0b4c6e292844bf2fb2c639a6c1421b6c53c6d0934
SHA512c18b47420cf1cf5806a3608501cea6970a26fb7dd4ab44d2316faae7bfb7c1670cb2c0eab316868d846efa3b9c1bb70706a5efb4924bc75e11031385c7430b00