Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
bb6904002d51da7d6841004dc294ab2ab5af655bfa5c67dbeb5d416b02b92168.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb6904002d51da7d6841004dc294ab2ab5af655bfa5c67dbeb5d416b02b92168.dll
Resource
win10v2004-20220901-en
General
-
Target
bb6904002d51da7d6841004dc294ab2ab5af655bfa5c67dbeb5d416b02b92168.dll
-
Size
14KB
-
MD5
0bff66829e9c5833ef9d21a94883f7ea
-
SHA1
bbc549d34ffa1eadc298e3ee2dfb1154e478f543
-
SHA256
bb6904002d51da7d6841004dc294ab2ab5af655bfa5c67dbeb5d416b02b92168
-
SHA512
373b01734800519e7ad7649a27320bb6c792caf6ec4bb5800a4614636ed64e31013c0eea8d1be62568259aa62c5ecf5a50c42c3ade42c0e0da0deeb02eb0fc63
-
SSDEEP
192:jtaQvwX0B1xDYBaBoxk4oyO6XBrt/M6XQ5bNvWgm1BZhi:pacC21aBaOO1W9FM6CbNvW/y
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4448 5068 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 5068 2340 rundll32.exe 82 PID 2340 wrote to memory of 5068 2340 rundll32.exe 82 PID 2340 wrote to memory of 5068 2340 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb6904002d51da7d6841004dc294ab2ab5af655bfa5c67dbeb5d416b02b92168.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb6904002d51da7d6841004dc294ab2ab5af655bfa5c67dbeb5d416b02b92168.dll,#12⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 7163⤵
- Program crash
PID:4448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5068 -ip 50681⤵PID:4608