Analysis
-
max time kernel
13s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
6862f95b6c8638d93d9308a7347bfc09.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6862f95b6c8638d93d9308a7347bfc09.dll
Resource
win10v2004-20231215-en
General
-
Target
6862f95b6c8638d93d9308a7347bfc09.dll
-
Size
22KB
-
MD5
6862f95b6c8638d93d9308a7347bfc09
-
SHA1
6cf59e8716e8fa69234b0c32b5f3e617922a37cc
-
SHA256
aa3f5c9620b39ba689f58251e4c0070a7eaec732f9eb00ab9cf906c2c15e490a
-
SHA512
0f1ba243a63c654d9a1af7257e0cb7967de43de4ea06e40f51b58e13060e08590e0f64ed17cff2f31eab28a63553355e43fec675376fabc1daf106fdce86aaa6
-
SSDEEP
192:ZTpjOHK9uwSZDqeM1p06CWFV0q6FuJs/U9A1m/c3hM+KNbcT5YmBt9JkGuBnom1g:ZNjOHKEw7N1O6X0H/PvMhMR9CHomij
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2992 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" rundll32.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\F: rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2992 rundll32.exe 2992 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 696 wrote to memory of 2992 696 rundll32.exe 16 PID 696 wrote to memory of 2992 696 rundll32.exe 16 PID 696 wrote to memory of 2992 696 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6862f95b6c8638d93d9308a7347bfc09.dll,#11⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6862f95b6c8638d93d9308a7347bfc09.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD56b45ca28cac77b131dbe82f5cf49c5ee
SHA1bcc471c0f9ae96a9ac7dfb95e72299cb31980615
SHA256f57aedd1d90a2121dd1a962181f2dd5f04662b0c7273e60879f1a4f661c6efe7
SHA51276a5629137254b1817f074bc53600710973f23c5f17bb6be6319fbc3e188e96c6f1a62b40c7580f1f1fb57eb8aee16182f4a9c615797dbda0a536a012e7cddd9