Analysis
-
max time kernel
202s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 03:54
Behavioral task
behavioral1
Sample
11f88c287b501abb341631221d59ef63089baa83faecbf222c3ba618e5f49456.dll
Resource
win7-20230712-en
windows7-x64
4 signatures
300 seconds
General
-
Target
11f88c287b501abb341631221d59ef63089baa83faecbf222c3ba618e5f49456.dll
-
Size
6.4MB
-
MD5
48514490face0a58cd5ea063e7de28e0
-
SHA1
ca52f90d5d6995f68bde1daf3900b3854431a3dd
-
SHA256
11f88c287b501abb341631221d59ef63089baa83faecbf222c3ba618e5f49456
-
SHA512
d1fdc7b7420f03dc29b9cd447a1235c34dab75b10b977b0d7cc72b429001a79d588d57f5d91165c4aff349313f6d76016ef44899f50963d3d774a97bfdcf1a48
-
SSDEEP
196608:NZwmQb62Pk1t+w69MCaSuxu70XSUAFTNknuFkJ:TW62Pk1t+JJuI70CbHe
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 3016 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/3016-55-0x000007FEF4900000-0x000007FEF5412000-memory.dmp vmprotect behavioral1/memory/3016-91-0x000007FEF4900000-0x000007FEF5412000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3016 rundll32.exe 3016 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3016-55-0x000007FEF4900000-0x000007FEF5412000-memory.dmpFilesize
11.1MB
-
memory/3016-54-0x00000000772F0000-0x00000000772F2000-memory.dmpFilesize
8KB
-
memory/3016-57-0x00000000772F0000-0x00000000772F2000-memory.dmpFilesize
8KB
-
memory/3016-59-0x00000000772F0000-0x00000000772F2000-memory.dmpFilesize
8KB
-
memory/3016-60-0x0000000077300000-0x0000000077302000-memory.dmpFilesize
8KB
-
memory/3016-62-0x0000000077300000-0x0000000077302000-memory.dmpFilesize
8KB
-
memory/3016-64-0x0000000077300000-0x0000000077302000-memory.dmpFilesize
8KB
-
memory/3016-65-0x0000000077310000-0x0000000077312000-memory.dmpFilesize
8KB
-
memory/3016-67-0x0000000077310000-0x0000000077312000-memory.dmpFilesize
8KB
-
memory/3016-69-0x0000000077310000-0x0000000077312000-memory.dmpFilesize
8KB
-
memory/3016-70-0x0000000077320000-0x0000000077322000-memory.dmpFilesize
8KB
-
memory/3016-72-0x0000000077320000-0x0000000077322000-memory.dmpFilesize
8KB
-
memory/3016-74-0x0000000077320000-0x0000000077322000-memory.dmpFilesize
8KB
-
memory/3016-77-0x000007FEFD0B0000-0x000007FEFD0B2000-memory.dmpFilesize
8KB
-
memory/3016-79-0x000007FEFD0B0000-0x000007FEFD0B2000-memory.dmpFilesize
8KB
-
memory/3016-82-0x000007FEFD0C0000-0x000007FEFD0C2000-memory.dmpFilesize
8KB
-
memory/3016-84-0x000007FEFD0C0000-0x000007FEFD0C2000-memory.dmpFilesize
8KB
-
memory/3016-85-0x0000000077330000-0x0000000077332000-memory.dmpFilesize
8KB
-
memory/3016-87-0x0000000077330000-0x0000000077332000-memory.dmpFilesize
8KB
-
memory/3016-90-0x0000000077140000-0x00000000772E9000-memory.dmpFilesize
1.7MB
-
memory/3016-91-0x000007FEF4900000-0x000007FEF5412000-memory.dmpFilesize
11.1MB
-
memory/3016-89-0x0000000077330000-0x0000000077332000-memory.dmpFilesize
8KB
-
memory/3016-92-0x0000000077140000-0x00000000772E9000-memory.dmpFilesize
1.7MB