Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
2cf8005fe6571778baa1181c9888795e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cf8005fe6571778baa1181c9888795e.dll
Resource
win10v2004-20231215-en
General
-
Target
2cf8005fe6571778baa1181c9888795e.dll
-
Size
84KB
-
MD5
2cf8005fe6571778baa1181c9888795e
-
SHA1
23c4ba56b05e870764d4c9748e5b8b537b6ff3a7
-
SHA256
4a45566604c3d1ddc43c0d2130614af779a0de8f165596bfdce3329c50efae90
-
SHA512
dec9154b796396ed16976c31013d1df36a72b2373fb26df5a2a098abd823e82d0836de29d2c846abcda97ea8184667dc4068409c90f73d32a97c5d0a37259ba4
-
SSDEEP
1536:ezXXEz132xYuOsiOBDokwPwIoaKRt/vKi:eE5IYuOsiOBDokKCx3
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2692 2424 rundll32.exe 28 PID 2424 wrote to memory of 2692 2424 rundll32.exe 28 PID 2424 wrote to memory of 2692 2424 rundll32.exe 28 PID 2424 wrote to memory of 2692 2424 rundll32.exe 28 PID 2424 wrote to memory of 2692 2424 rundll32.exe 28 PID 2424 wrote to memory of 2692 2424 rundll32.exe 28 PID 2424 wrote to memory of 2692 2424 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cf8005fe6571778baa1181c9888795e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cf8005fe6571778baa1181c9888795e.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2692
-