Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 09:56
Static task
static1
Behavioral task
behavioral1
Sample
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
-
Size
224KB
-
MD5
5d433bc4a6d35d59163886ce2b018a50
-
SHA1
3a7adcc793a3e6eca7ab1a5a9a021011ce06ae29
-
SHA256
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a
-
SHA512
f216dc872de718b3c361bacbae9cd86bb87401b48fc57d11713988cf20318b070fbe67f41e361c9e9bcbf7ee4acc363f878debd73ecdf43709069a48c9a74bd3
-
SSDEEP
3072:7ImqxXr/3QUvVAcZcCLFVtRD69MttI5lpVGP:7IJxXjvVAiFt+wWVGP
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\sapnet = "{20FEE25D-9CA8-4F39-AA81-411D001A5A83}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20FEE25D-9CA8-4F39-AA81-411D001A5A83}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20FEE25D-9CA8-4F39-AA81-411D001A5A83} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20FEE25D-9CA8-4F39-AA81-411D001A5A83}\InProcServer32\ = "C:\\Windows\\sapnet.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 1884 4572 rundll32.exe 76 PID 4572 wrote to memory of 1884 4572 rundll32.exe 76 PID 4572 wrote to memory of 1884 4572 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1884
-