Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll
Resource
win10v2004-20231222-en
General
-
Target
290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll
-
Size
4.8MB
-
MD5
2a0930f462f3a2e5b74b1db1b128b550
-
SHA1
d1d1f8a9a65fb38cc1fc2337a696f88d63ad39d1
-
SHA256
290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08
-
SHA512
7fa623c94ee2d62f427a9ea736a60fda4168d8ac137385a0bbbba16836b04c9991b6dfbcc9e1093291451489259424c24165819dd6d44826debaf8396e1d2250
-
SSDEEP
98304:u3VOzR5v8Qm/jEXUx4w6kLLF/9aNtFuSbfr0hz7m:kbsgKttzI
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 7 4496 rundll32.exe 8 4496 rundll32.exe 21 4496 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4496 rundll32.exe 4496 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4752 4496 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4496 2528 rundll32.exe 87 PID 2528 wrote to memory of 4496 2528 rundll32.exe 87 PID 2528 wrote to memory of 4496 2528 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 16483⤵
- Program crash
PID:4752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4496 -ip 44961⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD59c7b76d69c67618fda3b54a380378963
SHA13e0238d54e652746e9b331e9c341026ff26390cd
SHA256121f365a0c7d0c7e1983d23ea6c4b73f2b0fb1430c3e61f936e8e0d512e5bdf7
SHA51210aa256b8faad0777903da89aff85a6d0131d5f4db1cea05b42ca69e18d01e610ee1bfecd1c8494f2b8fcebe83fd7dd4c9eeb6bf8c894f7bbd07afde667f1d94
-
Filesize
1.1MB
MD526173e9c3998876d8d21d5063e02d3dd
SHA145eef50d6f845622a3384e34529abd9df43720c9
SHA256b1cc9445fd331df90f3dcd5eacbeff62ac9189aa867def1970bf1d755ef43b31
SHA5124f28a32b9e538e10de1533d8168a0b2e81793e73310d224bde4648b17f8bb9d1d24d0b40cc6f9b819489a0c7de1804d381d936069a093543b8aa0d3c62a50f12