Analysis
-
max time kernel
138s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
815e971458eb6208609852d82821738f8eb8092c063e64c1e2d4424c484c3b02.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
815e971458eb6208609852d82821738f8eb8092c063e64c1e2d4424c484c3b02.dll
Resource
win10v2004-20231023-en
General
-
Target
815e971458eb6208609852d82821738f8eb8092c063e64c1e2d4424c484c3b02.dll
-
Size
980KB
-
MD5
78d72db4cd2fcb1ccbcd0d56c073ecd6
-
SHA1
de24d75dddc49da51df2152c270e047aee7920db
-
SHA256
815e971458eb6208609852d82821738f8eb8092c063e64c1e2d4424c484c3b02
-
SHA512
29e567398266ab4976b600ec5d3afdcef0a14c3d83563b5fb2e47cad65f70097ed062fda5b07c99ee526181a5678c4b6d1441f09d22d38b69c215d9f846be75f
-
SSDEEP
24576:FYba1BY0nAYGEBIPX2faq6Y0n1YFF9kf/+EBqAvHrVHepuy1hKspUu5t:I4KYbBIPGfaq6Y0n1iF9kfGEBqAvHrVW
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 432 rundll32.exe -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3736 sc.exe 4464 sc.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 672 Process not Found 672 Process not Found 672 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 432 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3852 wrote to memory of 432 3852 rundll32.exe 46 PID 3852 wrote to memory of 432 3852 rundll32.exe 46 PID 3852 wrote to memory of 432 3852 rundll32.exe 46 PID 432 wrote to memory of 3060 432 rundll32.exe 95 PID 432 wrote to memory of 3060 432 rundll32.exe 95 PID 432 wrote to memory of 3060 432 rundll32.exe 95 PID 3060 wrote to memory of 3736 3060 CMD.exe 97 PID 3060 wrote to memory of 3736 3060 CMD.exe 97 PID 3060 wrote to memory of 3736 3060 CMD.exe 97 PID 432 wrote to memory of 920 432 rundll32.exe 98 PID 432 wrote to memory of 920 432 rundll32.exe 98 PID 432 wrote to memory of 920 432 rundll32.exe 98 PID 920 wrote to memory of 4464 920 CMD.exe 100 PID 920 wrote to memory of 4464 920 CMD.exe 100 PID 920 wrote to memory of 4464 920 CMD.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\815e971458eb6208609852d82821738f8eb8092c063e64c1e2d4424c484c3b02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\815e971458eb6208609852d82821738f8eb8092c063e64c1e2d4424c484c3b02.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\CMD.exeCMD /C SC STOP3⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\sc.exeSC STOP4⤵
- Launches sc.exe
PID:3736
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC DELETE3⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\sc.exeSC DELETE4⤵
- Launches sc.exe
PID:4464
-
-
-