Analysis
-
max time kernel
152s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll
Resource
win10v2004-20220812-en
General
-
Target
a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll
-
Size
101KB
-
MD5
cd7025a2c42410cdd034eca2e5b191e0
-
SHA1
13ce5d3daab90708983eb66bc0ece5fcc3e4eeba
-
SHA256
a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14
-
SHA512
3192519e964220c0413d596e074da3abaaeae5d9495b7623410410046637318a2f49525a75f16fcfec29a4359329d212a4cbe1fa4f1fc645adadddb0c79476e5
-
SSDEEP
3072:bGi1nGeyrKDXz3XAawc6HaWYK3f/NAo4:CiqKTw190KvVAo
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\I: rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 396 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3692 wrote to memory of 396 3692 rundll32.exe 80 PID 3692 wrote to memory of 396 3692 rundll32.exe 80 PID 3692 wrote to memory of 396 3692 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll,#12⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:396
-