Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 01:45
Static task
static1
Behavioral task
behavioral1
Sample
ce033e7122990b1c13c24241080daabafa824c7fea207f69f7b20879373c8488.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce033e7122990b1c13c24241080daabafa824c7fea207f69f7b20879373c8488.dll
Resource
win10v2004-20220812-en
General
-
Target
ce033e7122990b1c13c24241080daabafa824c7fea207f69f7b20879373c8488.dll
-
Size
439KB
-
MD5
6ac19eb52854a4c54f1d15a47006ca40
-
SHA1
2c047a3096d2eae93f10e81b305db188373dac5f
-
SHA256
ce033e7122990b1c13c24241080daabafa824c7fea207f69f7b20879373c8488
-
SHA512
ea881065669ece3200ea0db646f6726bebcfa014320b96da07849c74c19a998250ab1733533e4e33038f804f74358d5a4690e172bbc469c9f74c10b925de1449
-
SSDEEP
12288:3ci5MfnJSDaSwr3qH+w6NAxcLAcRdAP8QLY7/1C7Jz:3chwDaSs3k+w6ocLAcvAP9YT1k
Malware Config
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 11 4984 rundll32.exe 15 4984 rundll32.exe 30 4984 rundll32.exe 40 4984 rundll32.exe 50 4984 rundll32.exe 62 4984 rundll32.exe 66 4984 rundll32.exe 72 4984 rundll32.exe 76 4984 rundll32.exe 82 4984 rundll32.exe 86 4984 rundll32.exe 91 4984 rundll32.exe 95 4984 rundll32.exe 100 4984 rundll32.exe 104 4984 rundll32.exe 108 4984 rundll32.exe 112 4984 rundll32.exe 116 4984 rundll32.exe 120 4984 rundll32.exe 124 4984 rundll32.exe 129 4984 rundll32.exe 133 4984 rundll32.exe 137 4984 rundll32.exe 141 4984 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-35857163 rundll32.exe File created C:\Windows\SysWOW64\11912f rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4984 1400 rundll32.exe 81 PID 1400 wrote to memory of 4984 1400 rundll32.exe 81 PID 1400 wrote to memory of 4984 1400 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce033e7122990b1c13c24241080daabafa824c7fea207f69f7b20879373c8488.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce033e7122990b1c13c24241080daabafa824c7fea207f69f7b20879373c8488.dll,#12⤵
- Blocklisted process makes network request
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4984
-