Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 00:35
Behavioral task
behavioral1
Sample
e509525c561e9e4bea7029b1077a265a4ce277e699f534bc5eb6c4d24a626e63.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e509525c561e9e4bea7029b1077a265a4ce277e699f534bc5eb6c4d24a626e63.dll
Resource
win10v2004-20230220-en
General
-
Target
e509525c561e9e4bea7029b1077a265a4ce277e699f534bc5eb6c4d24a626e63.dll
-
Size
447KB
-
MD5
1eae2c76ca9006edd45d83c278de0f07
-
SHA1
846dd63256f0c03648b432a70f14cc1ae050e3f8
-
SHA256
e509525c561e9e4bea7029b1077a265a4ce277e699f534bc5eb6c4d24a626e63
-
SHA512
1de61f5e7a065c9676a7a4fe3e62a9f7051b71dce10c7fc21e58716057137196bfeb1bf5ff82a8845ab1a9ad96b744a4b44142c6c0638985fa88234336f2e993
-
SSDEEP
6144:toCTITIQJR7BoY5s+jmEuyN5nB3w0c6z9NFNGGcmk3xsKXgzOvygbddklP4Kzu4J:3IsoRqOluY3vbtTThSgobLk14yu45F
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2016 2040 rundll32.exe 28 PID 2040 wrote to memory of 2016 2040 rundll32.exe 28 PID 2040 wrote to memory of 2016 2040 rundll32.exe 28 PID 2040 wrote to memory of 2016 2040 rundll32.exe 28 PID 2040 wrote to memory of 2016 2040 rundll32.exe 28 PID 2040 wrote to memory of 2016 2040 rundll32.exe 28 PID 2040 wrote to memory of 2016 2040 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e509525c561e9e4bea7029b1077a265a4ce277e699f534bc5eb6c4d24a626e63.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e509525c561e9e4bea7029b1077a265a4ce277e699f534bc5eb6c4d24a626e63.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2016
-