Analysis
-
max time kernel
164s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
9b30cf4bd852bfa6829dbee88639b661d2ca34ecb15777aa5f5675651a30ce16.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b30cf4bd852bfa6829dbee88639b661d2ca34ecb15777aa5f5675651a30ce16.dll
Resource
win10v2004-20220812-en
General
-
Target
9b30cf4bd852bfa6829dbee88639b661d2ca34ecb15777aa5f5675651a30ce16.dll
-
Size
24KB
-
MD5
37a38bfd4f4cfd3b89e1a7d96a17f7b7
-
SHA1
3724365bd1b48c8e1601e1a6e83d355deac6e8b1
-
SHA256
9b30cf4bd852bfa6829dbee88639b661d2ca34ecb15777aa5f5675651a30ce16
-
SHA512
91a81294a6e1aa171ab636b7608f6ebb8e09d0b82921429898b66d9f1b47f12a62a92152252317fd2eae36629a5983fa055b667dbbb061ae538ba60c1bc24b5f
-
SSDEEP
384:3BmpovMMcr3XqSRq9TQpu9hTATAPu4aZmVPllxgjZGgRYmhsOp7OpMsYoS8k9xp8:IpkM5LPRMTQU/ThmWNllxMIgRYKfenfV
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4664 4292 rundll32.exe 79 PID 4292 wrote to memory of 4664 4292 rundll32.exe 79 PID 4292 wrote to memory of 4664 4292 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b30cf4bd852bfa6829dbee88639b661d2ca34ecb15777aa5f5675651a30ce16.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b30cf4bd852bfa6829dbee88639b661d2ca34ecb15777aa5f5675651a30ce16.dll,#12⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:4664
-