Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll
Resource
win10v2004-20231025-en
General
-
Target
1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll
-
Size
984KB
-
MD5
8edc68861e99ad2cc519ad54fb1b3ed4
-
SHA1
c1c02f6041eaeb58cdfcf29da9fb204622dd274c
-
SHA256
1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39
-
SHA512
270e31f654750ab3890c5ea19d31872d80df5704279b26ac5056689e70ba82036a89066634931fd7123c051b3be0a7785d50985b7a2a2b8095644628c3438c67
-
SSDEEP
24576:u8WXo3FXErUxj5r0cG4U1hH1fhKspa2M9b4VBq4vxlDx0llv9kYPWxZPTCpA99qb:ue5xj5r0h4U1hHRhKspWSq
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 17 2868 rundll32.exe 32 2868 rundll32.exe 46 2868 rundll32.exe -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 696 sc.exe 2000 sc.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 672 Process not Found 672 Process not Found 672 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2868 1244 rundll32.exe 85 PID 1244 wrote to memory of 2868 1244 rundll32.exe 85 PID 1244 wrote to memory of 2868 1244 rundll32.exe 85 PID 2868 wrote to memory of 3132 2868 rundll32.exe 91 PID 2868 wrote to memory of 3132 2868 rundll32.exe 91 PID 2868 wrote to memory of 3132 2868 rundll32.exe 91 PID 3132 wrote to memory of 696 3132 CMD.exe 93 PID 3132 wrote to memory of 696 3132 CMD.exe 93 PID 3132 wrote to memory of 696 3132 CMD.exe 93 PID 2868 wrote to memory of 3052 2868 rundll32.exe 94 PID 2868 wrote to memory of 3052 2868 rundll32.exe 94 PID 2868 wrote to memory of 3052 2868 rundll32.exe 94 PID 3052 wrote to memory of 2000 3052 CMD.exe 96 PID 3052 wrote to memory of 2000 3052 CMD.exe 96 PID 3052 wrote to memory of 2000 3052 CMD.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\CMD.exeCMD /C SC STOP3⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\sc.exeSC STOP4⤵
- Launches sc.exe
PID:696
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC DELETE3⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\sc.exeSC DELETE4⤵
- Launches sc.exe
PID:2000
-
-
-