Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll
Resource
win10v2004-20230703-en
General
-
Target
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll
-
Size
908KB
-
MD5
d663ebb9947ea39d2004a7fa6e8d79ca
-
SHA1
1fbdbe294fdb4aaa56ec93716abb2060195723c4
-
SHA256
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d
-
SHA512
4b25c84958b67e5fe235881b534f5ea6d7017d1b53572ff734f5eeac4fb09bbac77c16960165f9225d95ee64e1e222ec53d665fa7295751d75a7b8c0522b1c16
-
SSDEEP
24576:GHcgLiNmJ7FWqxxixsJrJ5WRJlqvHbNAx:Cc0igBsIrJ5SqWx
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 3 1860 rundll32.exe 15 1860 rundll32.exe 18 1860 rundll32.exe 21 1860 rundll32.exe 23 1860 rundll32.exe 24 1860 rundll32.exe 27 1860 rundll32.exe 28 1860 rundll32.exe 29 1860 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2392 1860 WerFault.exe 17 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2996 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2996 WINWORD.EXE 2996 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2996 1860 rundll32.exe 28 PID 1860 wrote to memory of 2996 1860 rundll32.exe 28 PID 1860 wrote to memory of 2996 1860 rundll32.exe 28 PID 1860 wrote to memory of 2996 1860 rundll32.exe 28 PID 1860 wrote to memory of 2392 1860 rundll32.exe 29 PID 1860 wrote to memory of 2392 1860 rundll32.exe 29 PID 1860 wrote to memory of 2392 1860 rundll32.exe 29 -
cURL User-Agent 9 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 18 curl/8.0.1-DEV HTTP User-Agent header 27 curl/8.0.1-DEV HTTP User-Agent header 29 curl/8.0.1-DEV HTTP User-Agent header 3 curl/8.0.1-DEV HTTP User-Agent header 15 curl/8.0.1-DEV HTTP User-Agent header 24 curl/8.0.1-DEV HTTP User-Agent header 28 curl/8.0.1-DEV HTTP User-Agent header 21 curl/8.0.1-DEV HTTP User-Agent header 23 curl/8.0.1-DEV
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll,#11⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Public\downloads\关于2023年3季度个人通信费报销工作的通知.docx"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1860 -s 5322⤵
- Program crash
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5604839b85b4f3067dd581dc8227943a6
SHA1dcd9a131ed39a695742c46c3d89cd5537ea7ddf6
SHA256fac4ccbd72e7121472d0a5dafdbea65d23ce8ccdb49a3c01c1fa5cf56d02fb31
SHA5120935c765de15ba48c0cd7555ed3758657848ee6bc5e5011667d7854093cb91ac6ac60a8575288784998aa926bf5614fc83caeed777fb738c5a16138f996a5c7d