Analysis
-
max time kernel
254s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
99eeafa282fde5d7b15c7a156df014e596e7f5855aa98bf616edf115a22ba79e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
99eeafa282fde5d7b15c7a156df014e596e7f5855aa98bf616edf115a22ba79e.dll
Resource
win10v2004-20221111-en
General
-
Target
99eeafa282fde5d7b15c7a156df014e596e7f5855aa98bf616edf115a22ba79e.dll
-
Size
32KB
-
MD5
f073043a508ac2d71425fe5cf03832da
-
SHA1
25483a83dc7be5af5a62afdf8809f2cbbe6f681c
-
SHA256
99eeafa282fde5d7b15c7a156df014e596e7f5855aa98bf616edf115a22ba79e
-
SHA512
9eb39705cc7f1a4bae37743a7b4f9a5842e2c2f38d51754f6f3c4b39f71a5cfb1be75785bb08957eb43b2b15998f63adff135cbb8b609cd68136047a2b20add8
-
SSDEEP
768:PJ5zdDBFfgdJXa68ZtuUR9SALA5mnO39q2xXqpFL7UfIB:PjHEA0UBLAHLxsUfIB
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3076 wrote to memory of 3340 3076 rundll32.exe 81 PID 3076 wrote to memory of 3340 3076 rundll32.exe 81 PID 3076 wrote to memory of 3340 3076 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99eeafa282fde5d7b15c7a156df014e596e7f5855aa98bf616edf115a22ba79e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99eeafa282fde5d7b15c7a156df014e596e7f5855aa98bf616edf115a22ba79e.dll,#12⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:3340
-