Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
06407291ede076818f1234ddc94836f5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06407291ede076818f1234ddc94836f5.dll
Resource
win10v2004-20231215-en
General
-
Target
06407291ede076818f1234ddc94836f5.dll
-
Size
395KB
-
MD5
06407291ede076818f1234ddc94836f5
-
SHA1
8911570fe822819cf41d627e01a0af357a2ed4c1
-
SHA256
e1aac48ed5b516abd110c102b928640bd409c18ee27ee2759f00775097435353
-
SHA512
7f20b51fec9a7c214b68aba1df0666104b49d777ec5410b67995b9b2cfc937e07cb0e7c6a3cb923631e4d1dc97779b684fd355c17852dc11f40fe9c4a020c3e3
-
SSDEEP
12288:bgOHTl3IxS9d9N4c2tJYFYUBMUHhCmyva:bgOHTx7dTOJHUgmyC
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\{7937403C31CF2BA4BA0DC8E74D6FEF9A}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\206D.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2480 regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2928 wrote to memory of 2436 2928 rundll32.exe 16 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29 PID 2436 wrote to memory of 2480 2436 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06407291ede076818f1234ddc94836f5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06407291ede076818f1234ddc94836f5.dll,#12⤵
- Sets service image path in registry
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1890.tmp3⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:2480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5c3bb1087e36b7f173a802bfdd340caf2
SHA1794acfd08b4bf1ce76eb8d17e90dbf3422906f5b
SHA256a9379fa5cac8058f033aa1e9c95c27940c89e33202f8b36b48ee4ab00122914f
SHA5120784df214d461075afed782b67a70d44d828c0a9c730dc3e104f9cf7103d65f09b5baae43a91f0868fa099eab66d02458196acbb2a0225f6a89b6c951ac02366
-
Filesize
92KB
MD5057f61333a93cf0b9cc311bb6a17da63
SHA1e762166305861aaca86682b2720668d832c74a19
SHA25684cb90d9d48aacbf645a6b35d8ab1cc5291bd7feed870bb3e480381569a068c6
SHA512f0e6870e8f4adcabd1eff9408f16377cf1ec8d69181fd0da77c07968cb8fb4a6a4e5058dcf3678240a4e955c12f8d477c2450a07c71996c89b1c2554cf91c0c2