Analysis
-
max time kernel
195s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll
Resource
win10v2004-20230915-en
General
-
Target
4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll
-
Size
2.8MB
-
MD5
9f6e0d492f7445840ad2d7052cfa177f
-
SHA1
2bc776e2c636e317db3ed701187ee7863fb41543
-
SHA256
4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c
-
SHA512
051c4069026b79c1a30f2a3eb77a498f6907053754aa0a887fa29670321d70e9f108957cf7e94dad25bf941562f20678875a2d07b469b0ffc69e3eb5687a6577
-
SSDEEP
49152:nak0aV1RZLnSnZ6R2S3IJ5RLqe94arMhjcU+uwaHz+hxJ+0pcMZ/3Vz:a381RZLngS3IJ5RLu0MhKhx80pRP
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe 996 rundll32.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 996 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 996 5064 rundll32.exe 84 PID 5064 wrote to memory of 996 5064 rundll32.exe 84 PID 5064 wrote to memory of 996 5064 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:996
-