Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-07-2023 01:04
Behavioral task
behavioral1
Sample
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
Resource
win10v2004-20230703-en
General
-
Target
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
-
Size
335KB
-
MD5
a637c909097b250da561b12ae33e7486
-
SHA1
f71cc41357814b5c3b132aaaedd6a24ebbd0c102
-
SHA256
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3
-
SHA512
a02a4244947a3ca24d65a356b8ae405b4620884d033d29570a411c539f6e55eca0c579ab3b61de9a14e4eaec66417e57974ee7b28bb03e2728c359cef3168ce3
-
SSDEEP
6144:R1VH+po6EJ5IYW6eBveHVK8PNEt1ZJr0HkT7Npvm7sbnTH7Mx:3d4oR+YImEx/gkThp0wnTHYx
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
rundll32.exeflow pid process 3 1216 rundll32.exe 5 1216 rundll32.exe 6 1216 rundll32.exe 7 1216 rundll32.exe 8 1216 rundll32.exe 9 1216 rundll32.exe 10 1216 rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\Tasks\NvTmRep_CrashReport4_{ B2FE1952 - 0186 - 46H3 - BAHC - A80AA35AH5B8 }.job rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
rundll32.exepid process 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe 1216 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1216 1952 rundll32.exe rundll32.exe PID 1216 wrote to memory of 2652 1216 rundll32.exe cmd.exe PID 1216 wrote to memory of 2652 1216 rundll32.exe cmd.exe PID 1216 wrote to memory of 2652 1216 rundll32.exe cmd.exe PID 1216 wrote to memory of 2652 1216 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll,#12⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C nltest /domain_trusts > C:\ProgramData\TMPUSER.DAT3⤵PID:2652
-
-