Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 08:51
Static task
static1
Behavioral task
behavioral1
Sample
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll
Resource
win10v2004-20231023-en
General
-
Target
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll
-
Size
952KB
-
MD5
af078c4997ef2244bdc3dbe809731890
-
SHA1
74028e8d04be0f824508814bc36addc6bb4e7cd6
-
SHA256
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e
-
SHA512
7da33bc9f7f4065c65a96242e4471b8e56413a9625f253f93539eb365ee5fde873f7295b736c6b955b56c2b3fe90c5c0bad20f025c18aaa509081e54b67c0050
-
SSDEEP
24576:yYp2/iV8pXtdsmLkNPn2rbnRvZVhKspzhWOc:yHSy9oARnhKsp1
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 3 3060 rundll32.exe 5 3060 rundll32.exe 6 3060 rundll32.exe 7 3060 rundll32.exe 8 3060 rundll32.exe 9 3060 rundll32.exe 10 3060 rundll32.exe 11 3060 rundll32.exe 12 3060 rundll32.exe 13 3060 rundll32.exe 14 3060 rundll32.exe 16 3060 rundll32.exe -
Stops running service(s) 3 TTPs
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2732 sc.exe 2728 sc.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 2044 wrote to memory of 3060 2044 rundll32.exe 28 PID 3060 wrote to memory of 2632 3060 rundll32.exe 30 PID 3060 wrote to memory of 2632 3060 rundll32.exe 30 PID 3060 wrote to memory of 2632 3060 rundll32.exe 30 PID 3060 wrote to memory of 2632 3060 rundll32.exe 30 PID 2632 wrote to memory of 2732 2632 CMD.exe 32 PID 2632 wrote to memory of 2732 2632 CMD.exe 32 PID 2632 wrote to memory of 2732 2632 CMD.exe 32 PID 2632 wrote to memory of 2732 2632 CMD.exe 32 PID 3060 wrote to memory of 2748 3060 rundll32.exe 33 PID 3060 wrote to memory of 2748 3060 rundll32.exe 33 PID 3060 wrote to memory of 2748 3060 rundll32.exe 33 PID 3060 wrote to memory of 2748 3060 rundll32.exe 33 PID 2748 wrote to memory of 2728 2748 CMD.exe 35 PID 2748 wrote to memory of 2728 2748 CMD.exe 35 PID 2748 wrote to memory of 2728 2748 CMD.exe 35 PID 2748 wrote to memory of 2728 2748 CMD.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\CMD.exeCMD /C SC STOP3⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\sc.exeSC STOP4⤵
- Launches sc.exe
PID:2732
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC DELETE3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\sc.exeSC DELETE4⤵
- Launches sc.exe
PID:2728
-
-
-