Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll
Resource
win10v2004-20230220-en
General
-
Target
552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll
-
Size
960KB
-
MD5
c020f8e756f632c4cd47bc31f100905b
-
SHA1
a6dddbfd15eda8fd5eda82adf5ffea70ea20d342
-
SHA256
552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240
-
SHA512
4c2f074d4da7dc57f36d332b48d256521b2531786409e25f495f6d59ddd1d378d61809189306240d711029b9ae76ff514cd43400e55fce65ff9ae1949532386c
-
SSDEEP
24576:D+o/IO2KinSjvj/3r+F+BCWYMTnTnSaxioHQp:ao/I9K1bxCPMTnTbP+
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4044 2284 WerFault.exe 83 1440 2284 WerFault.exe 83 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier rundll32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sg1979013809b.dzx rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\sg1979013809b.dzx\ = 0b07ab00ea103dc0f46ac4510ec9968e rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2284 4632 rundll32.exe 83 PID 4632 wrote to memory of 2284 4632 rundll32.exe 83 PID 4632 wrote to memory of 2284 4632 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll,#12⤵
- Checks BIOS information in registry
- Enumerates system info in registry
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 7003⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 6923⤵
- Program crash
PID:1440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2284 -ip 22841⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2284 -ip 22841⤵PID:4832