Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04-08-2023 19:50
Behavioral task
behavioral1
Sample
bb4e3b588aedce8e203361b0879d9113.dll
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
General
-
Target
bb4e3b588aedce8e203361b0879d9113.dll
-
Size
5.8MB
-
MD5
bb4e3b588aedce8e203361b0879d9113
-
SHA1
1b7161fe8b076b9bd5eea6652a5b7f9e329b242e
-
SHA256
d0861b2aed04474e7e0f524c0cf6f8495494fc509b0fb8dc94d89dd1dcbacc5e
-
SHA512
53f1df93fa7868a215aae133c528eb0d4f32a1404909dbd836ae21fdc0d53ad56e6ac03ffea8948898cb6ff98f8cf23bebc84a1488e6dc4ea162ab34aeb45ea9
-
SSDEEP
98304:hqxMdwv65XzQ7bbf2ptVi58VQV6mS+O17/8s7WUpi7epveUN97lU0EpE7rbTgQ:MSKStQ72pPVA6L+DsqwiBsuaX
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2492 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2492-55-0x000007FEF5410000-0x000007FEF5E67000-memory.dmp vmprotect behavioral1/memory/2492-91-0x000007FEF5410000-0x000007FEF5E67000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2492 rundll32.exe 2492 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2492-55-0x000007FEF5410000-0x000007FEF5E67000-memory.dmpFilesize
10.3MB
-
memory/2492-54-0x0000000077D40000-0x0000000077D42000-memory.dmpFilesize
8KB
-
memory/2492-57-0x0000000077D40000-0x0000000077D42000-memory.dmpFilesize
8KB
-
memory/2492-59-0x0000000077D40000-0x0000000077D42000-memory.dmpFilesize
8KB
-
memory/2492-60-0x0000000077D50000-0x0000000077D52000-memory.dmpFilesize
8KB
-
memory/2492-62-0x0000000077D50000-0x0000000077D52000-memory.dmpFilesize
8KB
-
memory/2492-64-0x0000000077D50000-0x0000000077D52000-memory.dmpFilesize
8KB
-
memory/2492-65-0x0000000077D60000-0x0000000077D62000-memory.dmpFilesize
8KB
-
memory/2492-67-0x0000000077D60000-0x0000000077D62000-memory.dmpFilesize
8KB
-
memory/2492-69-0x0000000077D60000-0x0000000077D62000-memory.dmpFilesize
8KB
-
memory/2492-70-0x0000000077D70000-0x0000000077D72000-memory.dmpFilesize
8KB
-
memory/2492-72-0x0000000077D70000-0x0000000077D72000-memory.dmpFilesize
8KB
-
memory/2492-74-0x0000000077D70000-0x0000000077D72000-memory.dmpFilesize
8KB
-
memory/2492-77-0x000007FEFDD10000-0x000007FEFDD12000-memory.dmpFilesize
8KB
-
memory/2492-79-0x000007FEFDD10000-0x000007FEFDD12000-memory.dmpFilesize
8KB
-
memory/2492-82-0x000007FEFDD20000-0x000007FEFDD22000-memory.dmpFilesize
8KB
-
memory/2492-84-0x000007FEFDD20000-0x000007FEFDD22000-memory.dmpFilesize
8KB
-
memory/2492-85-0x0000000077D80000-0x0000000077D82000-memory.dmpFilesize
8KB
-
memory/2492-87-0x0000000077D80000-0x0000000077D82000-memory.dmpFilesize
8KB
-
memory/2492-89-0x0000000077D80000-0x0000000077D82000-memory.dmpFilesize
8KB
-
memory/2492-90-0x0000000077B90000-0x0000000077D39000-memory.dmpFilesize
1.7MB
-
memory/2492-91-0x000007FEF5410000-0x000007FEF5E67000-memory.dmpFilesize
10.3MB
-
memory/2492-92-0x0000000077B90000-0x0000000077D39000-memory.dmpFilesize
1.7MB