Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-02-2023 04:50
Static task
static1
Behavioral task
behavioral1
Sample
92b38091f9f7e830d083f33f0303640cf381c302d03ec3cc742fee1312216e31.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92b38091f9f7e830d083f33f0303640cf381c302d03ec3cc742fee1312216e31.dll
Resource
win10v2004-20220812-en
General
-
Target
92b38091f9f7e830d083f33f0303640cf381c302d03ec3cc742fee1312216e31.dll
-
Size
4.9MB
-
MD5
2ecf1b072a18a1422cf930b11e2c3247
-
SHA1
d9ca379437a0fa5906c5742c18a896c5c4ea5709
-
SHA256
92b38091f9f7e830d083f33f0303640cf381c302d03ec3cc742fee1312216e31
-
SHA512
f451b0f1cda54262ab75839a0acca849715dbf686a19087192ebd1e78ca1b88377e96553efeeb650c2ecb35f923331af348f713cb461113b7fd03f64ef05cb2a
-
SSDEEP
98304:fBHB2pne7a1mN1E8lkcf5YjovKqGYiOE8oLj5jIrHL3GqHqh:fv1GGE5gyjovK65E8oqjLPu
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 3 2016 rundll32.exe 6 2016 rundll32.exe 8 2016 rundll32.exe 9 2016 rundll32.exe 10 2016 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2016 1112 rundll32.exe 28 PID 1112 wrote to memory of 2016 1112 rundll32.exe 28 PID 1112 wrote to memory of 2016 1112 rundll32.exe 28 PID 1112 wrote to memory of 2016 1112 rundll32.exe 28 PID 1112 wrote to memory of 2016 1112 rundll32.exe 28 PID 1112 wrote to memory of 2016 1112 rundll32.exe 28 PID 1112 wrote to memory of 2016 1112 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92b38091f9f7e830d083f33f0303640cf381c302d03ec3cc742fee1312216e31.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92b38091f9f7e830d083f33f0303640cf381c302d03ec3cc742fee1312216e31.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a46135bdd574092d85955070e72d5aad
SHA1aad137b0a883fea22b7118778512ffc7865513bc
SHA256aa57160684feb240a85da677caaf7cf6a08b7349d89ae9cb4a3476884d80aac5
SHA51272188f348d9ae33e2b5a7886c80667cc3015bfac170249537baa9e31abf8d63ca198903206feb64887f1d509a1b9bfc9f54ede8b3aa26bee3f5c4375e5c6a24b
-
Filesize
234KB
MD5cd03029957ebc78c0ca7a6c02a9ca846
SHA10044114b8073781479044f0294701be9611be2ac
SHA256139fdd92e6ddf1aac0761a68502b374daa32e82039621018511dc491ed9b4048
SHA51214c641cb9536def0ddc1969d50b97b83a23017c97373e3ad74d3fbf9825ac81f3fdf8169281c8ad4cebd45d9c9ae05f752d553ba4653e620889b274479cb7c32
-
Filesize
2.1MB
MD56747848a45de0eaa7e3dbc339a4d11ff
SHA1698b763d9b6530cbef35f2c4f6240ab51f98879b
SHA2568b060c0575bcf7b466166d8397c65c5be150c21cce32a680c448c3605f524eb1
SHA5123fb05eb464a5b3a6e1d6b0c40d96fc55c6fcd9c6e4eeafe9a3911530b55491a1bb0d4821fbbe2b25c9fe0baef8f208ad307b530ff73f86351fb1e3e6c2c3acbe