Analysis
-
max time kernel
38s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
d2c13d9a31f16f369a1a5eacb1852f27c163d9a4328d6ff0e0a09b4a4cd78f4f.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d2c13d9a31f16f369a1a5eacb1852f27c163d9a4328d6ff0e0a09b4a4cd78f4f.dll
Resource
win10v2004-20230220-en
General
-
Target
d2c13d9a31f16f369a1a5eacb1852f27c163d9a4328d6ff0e0a09b4a4cd78f4f.dll
-
Size
1.2MB
-
MD5
a05f1b98f25a4b7093093e3b65df9ab8
-
SHA1
8dec8bfd3f79729013d9169410857840d7795204
-
SHA256
d2c13d9a31f16f369a1a5eacb1852f27c163d9a4328d6ff0e0a09b4a4cd78f4f
-
SHA512
50ee7f8b67415074633aa11a46058de72127cc7170fb8138466e5e9ab8e2ca54400b3c232c17372d54e7865090e31a71e3517082971dab7ef14085af5715aad5
-
SSDEEP
24576:53Hgz8MmGQcoAnhFGs7G3izL8j7R9XG3r:RHjcrFGNyzu9Xm
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 324 rundll32.exe 324 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 324 rundll32.exe Token: SeShutdownPrivilege 324 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 324 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 908 wrote to memory of 324 908 rundll32.exe 27 PID 908 wrote to memory of 324 908 rundll32.exe 27 PID 908 wrote to memory of 324 908 rundll32.exe 27 PID 908 wrote to memory of 324 908 rundll32.exe 27 PID 908 wrote to memory of 324 908 rundll32.exe 27 PID 908 wrote to memory of 324 908 rundll32.exe 27 PID 908 wrote to memory of 324 908 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2c13d9a31f16f369a1a5eacb1852f27c163d9a4328d6ff0e0a09b4a4cd78f4f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2c13d9a31f16f369a1a5eacb1852f27c163d9a4328d6ff0e0a09b4a4cd78f4f.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:324
-