Analysis
-
max time kernel
0s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 05:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42dd01e971b71bb9e62f068fa79d68d3.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
42dd01e971b71bb9e62f068fa79d68d3.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
42dd01e971b71bb9e62f068fa79d68d3.dll
-
Size
540KB
-
MD5
42dd01e971b71bb9e62f068fa79d68d3
-
SHA1
00de4532b08d66eccf83fde22a9ebe50c576749b
-
SHA256
3278b79e1d7f019d7a8d9f092853619b730bf499a544d2315f87b05f68a43e11
-
SHA512
28cb61b676f721479be2b6f2a0ef49fe34b5c57f01fc5ba52ed5a1a47929a15cad9eec497f819015e74bc638fdff8789041269b01a1f9ddcbc11482939cf45ae
-
SSDEEP
6144:Jzt4VYcPTu0xQZIJBvW9v5wlgInmCg0j2b2HTPlccgVPif6hF5:hCPq0xzsR5s/m70jOweN
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5} rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 212 1048 rundll32.exe 12 PID 1048 wrote to memory of 212 1048 rundll32.exe 12 PID 1048 wrote to memory of 212 1048 rundll32.exe 12
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42dd01e971b71bb9e62f068fa79d68d3.dll,#11⤵
- Checks BIOS information in registry
- Modifies registry class
PID:212
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42dd01e971b71bb9e62f068fa79d68d3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048