Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 01:04
Behavioral task
behavioral1
Sample
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
Resource
win10v2004-20230703-en
General
-
Target
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
-
Size
335KB
-
MD5
a637c909097b250da561b12ae33e7486
-
SHA1
f71cc41357814b5c3b132aaaedd6a24ebbd0c102
-
SHA256
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3
-
SHA512
a02a4244947a3ca24d65a356b8ae405b4620884d033d29570a411c539f6e55eca0c579ab3b61de9a14e4eaec66417e57974ee7b28bb03e2728c359cef3168ce3
-
SSDEEP
6144:R1VH+po6EJ5IYW6eBveHVK8PNEt1ZJr0HkT7Npvm7sbnTH7Mx:3d4oR+YImEx/gkThp0wnTHYx
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
rundll32.exeflow pid process 29 2784 rundll32.exe 37 2784 rundll32.exe 63 2784 rundll32.exe 67 2784 rundll32.exe 70 2784 rundll32.exe 71 2784 rundll32.exe 75 2784 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\Tasks\NvTmRep_CrashReport4_{ B2FE1952 - 0186 - 46H3 - BAHC - A80AA35AH5B8 }.job rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
rundll32.exepid process 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2460 wrote to memory of 2784 2460 rundll32.exe rundll32.exe PID 2460 wrote to memory of 2784 2460 rundll32.exe rundll32.exe PID 2460 wrote to memory of 2784 2460 rundll32.exe rundll32.exe PID 2784 wrote to memory of 4484 2784 rundll32.exe cmd.exe PID 2784 wrote to memory of 4484 2784 rundll32.exe cmd.exe PID 2784 wrote to memory of 4484 2784 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C nltest /domain_trusts > C:\ProgramData\TMPUSER.DAT3⤵PID:4484
-
-