Analysis
-
max time kernel
17s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 09:56
Static task
static1
Behavioral task
behavioral1
Sample
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
-
Size
224KB
-
MD5
5d433bc4a6d35d59163886ce2b018a50
-
SHA1
3a7adcc793a3e6eca7ab1a5a9a021011ce06ae29
-
SHA256
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a
-
SHA512
f216dc872de718b3c361bacbae9cd86bb87401b48fc57d11713988cf20318b070fbe67f41e361c9e9bcbf7ee4acc363f878debd73ecdf43709069a48c9a74bd3
-
SSDEEP
3072:7ImqxXr/3QUvVAcZcCLFVtRD69MttI5lpVGP:7IJxXjvVAiFt+wWVGP
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\sapnet = "{3DF98EE6-399B-4AB4-986A-65AB75967598}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF98EE6-399B-4AB4-986A-65AB75967598}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF98EE6-399B-4AB4-986A-65AB75967598} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF98EE6-399B-4AB4-986A-65AB75967598}\InProcServer32\ = "C:\\Windows\\sapnet.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 552 wrote to memory of 1496 552 rundll32.exe 27 PID 552 wrote to memory of 1496 552 rundll32.exe 27 PID 552 wrote to memory of 1496 552 rundll32.exe 27 PID 552 wrote to memory of 1496 552 rundll32.exe 27 PID 552 wrote to memory of 1496 552 rundll32.exe 27 PID 552 wrote to memory of 1496 552 rundll32.exe 27 PID 552 wrote to memory of 1496 552 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1496
-