Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 14:21
Static task
static1
Behavioral task
behavioral1
Sample
dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d.dll
Resource
win10v2004-20221111-en
General
-
Target
dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d.dll
-
Size
128KB
-
MD5
bd044ffe4c0545a78d1c469100099049
-
SHA1
f25847348d752f4e96f904e0264991625dd8f8ae
-
SHA256
dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d
-
SHA512
13465c4de25a811ec68b33faf164fac8af4a2865b27723a404a4e8801ce35d351951084eb774e169ad0b55f145965b496013ccffc8605e5c8539a99981da0cd9
-
SSDEEP
3072:hPP9JJGoDV7OcVrB9DsdTqs3OL5PFn0wcccccccc:FPlV7jB9DsdTX30PFn0wcccccccc
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1116 rundll32.exe 3 1696 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{B4D5C423-984C-4BEE-B983-8E634A553ABD} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{B4D5C423-984C-4BEE-B983-8E634A553ABD}\\7ba6.dll\",DllGetClassObject secret 26468" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1116 rundll32.exe 1696 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1792 wrote to memory of 1116 1792 rundll32.exe 28 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29 PID 1116 wrote to memory of 1696 1116 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{B4D5C423-984C-4BEE-B983-8E634A553ABD}\7ba6.dll",DllGetClassObject secret 264683⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5bd044ffe4c0545a78d1c469100099049
SHA1f25847348d752f4e96f904e0264991625dd8f8ae
SHA256dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d
SHA51213465c4de25a811ec68b33faf164fac8af4a2865b27723a404a4e8801ce35d351951084eb774e169ad0b55f145965b496013ccffc8605e5c8539a99981da0cd9
-
Filesize
128KB
MD5bd044ffe4c0545a78d1c469100099049
SHA1f25847348d752f4e96f904e0264991625dd8f8ae
SHA256dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d
SHA51213465c4de25a811ec68b33faf164fac8af4a2865b27723a404a4e8801ce35d351951084eb774e169ad0b55f145965b496013ccffc8605e5c8539a99981da0cd9
-
Filesize
128KB
MD5bd044ffe4c0545a78d1c469100099049
SHA1f25847348d752f4e96f904e0264991625dd8f8ae
SHA256dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d
SHA51213465c4de25a811ec68b33faf164fac8af4a2865b27723a404a4e8801ce35d351951084eb774e169ad0b55f145965b496013ccffc8605e5c8539a99981da0cd9
-
Filesize
128KB
MD5bd044ffe4c0545a78d1c469100099049
SHA1f25847348d752f4e96f904e0264991625dd8f8ae
SHA256dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d
SHA51213465c4de25a811ec68b33faf164fac8af4a2865b27723a404a4e8801ce35d351951084eb774e169ad0b55f145965b496013ccffc8605e5c8539a99981da0cd9
-
Filesize
128KB
MD5bd044ffe4c0545a78d1c469100099049
SHA1f25847348d752f4e96f904e0264991625dd8f8ae
SHA256dcf1b2e6c8107aed058a8e7e3b874f16f84cf811bd6f5ee0dc8230943004190d
SHA51213465c4de25a811ec68b33faf164fac8af4a2865b27723a404a4e8801ce35d351951084eb774e169ad0b55f145965b496013ccffc8605e5c8539a99981da0cd9