Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
2cdb90413ba80e6294c82d7290eb43961ac815500886fc2829deb70c1897d6fe.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cdb90413ba80e6294c82d7290eb43961ac815500886fc2829deb70c1897d6fe.dll
Resource
win10v2004-20231222-en
General
-
Target
2cdb90413ba80e6294c82d7290eb43961ac815500886fc2829deb70c1897d6fe.dll
-
Size
632KB
-
MD5
95f6589475fc87376dd53da033c7e122
-
SHA1
c7b53481cc0d1a67b75970dcf53b81c565ca6ee2
-
SHA256
2cdb90413ba80e6294c82d7290eb43961ac815500886fc2829deb70c1897d6fe
-
SHA512
3556e67ba7da8a6e94ca8cf2c23c9bc57f20b5c6cfe631b1da14c54ec6d66049afc1e0044335a9f4df8ab893a69c953d80c971de2a00242fa9a25b88efd5492d
-
SSDEEP
12288:H2ojwpSrNlxw8NjvPyA0Y9nE4U54hv+QohBjvrEH71E:H2gwpSrtwmjtF9EB4hvXo/rEH71E
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 21 4460 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4460 rundll32.exe -
resource yara_rule behavioral2/memory/4460-4-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4460-10-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\common files\system\symsrv.dll.000 rundll32.exe File created C:\Program Files\Common Files\System\symsrv.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4460 rundll32.exe 4460 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4460 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4460 2196 rundll32.exe 14 PID 2196 wrote to memory of 4460 2196 rundll32.exe 14 PID 2196 wrote to memory of 4460 2196 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cdb90413ba80e6294c82d7290eb43961ac815500886fc2829deb70c1897d6fe.dll,#11⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4460
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cdb90413ba80e6294c82d7290eb43961ac815500886fc2829deb70c1897d6fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196