Analysis
-
max time kernel
167s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 22:38
Static task
static1
Behavioral task
behavioral1
Sample
dca7b5cb407c13a9b5cafa6d22bc7cc04cac9d33b0c9eb9588c43ebb672cc39f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dca7b5cb407c13a9b5cafa6d22bc7cc04cac9d33b0c9eb9588c43ebb672cc39f.dll
Resource
win10v2004-20221111-en
General
-
Target
dca7b5cb407c13a9b5cafa6d22bc7cc04cac9d33b0c9eb9588c43ebb672cc39f.dll
-
Size
148KB
-
MD5
200f8b15cce07e635b937c913c8e6456
-
SHA1
8fdb906cb29c153df82fbd4925924c66ea39db62
-
SHA256
dca7b5cb407c13a9b5cafa6d22bc7cc04cac9d33b0c9eb9588c43ebb672cc39f
-
SHA512
46bfa8a4e3cf8ed23f80b4807cdbf57c0838679835b5d54db817474de65373eb236c289dcd87073700252bd26ad5bd42736197199ae22ba376a932cb90ed485c
-
SSDEEP
3072:hri717vQ3XaAfFmLrdIFYmcSggHtldkW15+tjZZqTwyGBhVJ/XjviJvf:xI17vQ3X0rVmcSggHN1ctjjq87hVsv
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 38 3232 rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ecf5d260\imagepath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\1EF2.tmp" rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3232 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3232 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3232 1704 rundll32.exe 71 PID 1704 wrote to memory of 3232 1704 rundll32.exe 71 PID 1704 wrote to memory of 3232 1704 rundll32.exe 71
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dca7b5cb407c13a9b5cafa6d22bc7cc04cac9d33b0c9eb9588c43ebb672cc39f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dca7b5cb407c13a9b5cafa6d22bc7cc04cac9d33b0c9eb9588c43ebb672cc39f.dll,#12⤵
- Blocklisted process makes network request
- Sets service image path in registry
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3232
-