Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
730fc8b5469ca6505a8523d62fa9d7a4.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
730fc8b5469ca6505a8523d62fa9d7a4.dll
Resource
win10v2004-20231215-en
General
-
Target
730fc8b5469ca6505a8523d62fa9d7a4.dll
-
Size
29KB
-
MD5
730fc8b5469ca6505a8523d62fa9d7a4
-
SHA1
6504f29f5ed80e22fad046ea2ce3b474b3aaef16
-
SHA256
baeeffe4cc8f0064662586cc291572f035298d9831d4d3a75cc1f5f8d5cd90cb
-
SHA512
cd7f70d0d8ac8b56abcef0120ce5e29a1eee919b430c70951a2f6b298be69bc226a2eef273317262702bc9f0752f49be12cbc396cb87963deac562a4cd90dcc7
-
SSDEEP
768:LWsyqAgg/PeKZhdVkfDJbOhM64mb1q3CTv:SsyqFg/Pzh2lOh4okSTv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2556 rundll32.exe 2556 rundll32.exe 2556 rundll32.exe 2556 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDLL (sysmgr.dll) = "rundll32.exe C:\\Windows\\system32\\sysmgr.dll,start" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysmgr.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\sysmgr.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 860 wrote to memory of 2104 860 rundll32.exe 28 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2556 2104 rundll32.exe 29 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31 PID 2104 wrote to memory of 2844 2104 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\730fc8b5469ca6505a8523d62fa9d7a4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\730fc8b5469ca6505a8523d62fa9d7a4.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\sysmgr.dll,start3⤵
- Loads dropped DLL
PID:2556
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uninstall.bat" "3⤵
- Deletes itself
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5180345f20440d5fb684035a52a2cfb19
SHA121e16bda29e5815429723c6ae17ec4e928d9b363
SHA256c3331f5f7f93f978d9b4c7b0f9859c1d2a3387fd57dc394486345d1f69364d1a
SHA512267dc94e6cfc19de704ba1f7b7eb220b7f94801d4480df9d35cd240ce130905c3c64d1ae104c3636055eb817126f7c5fe63f540dfb1642920bfb1067dacc450a
-
Filesize
29KB
MD5730fc8b5469ca6505a8523d62fa9d7a4
SHA16504f29f5ed80e22fad046ea2ce3b474b3aaef16
SHA256baeeffe4cc8f0064662586cc291572f035298d9831d4d3a75cc1f5f8d5cd90cb
SHA512cd7f70d0d8ac8b56abcef0120ce5e29a1eee919b430c70951a2f6b298be69bc226a2eef273317262702bc9f0752f49be12cbc396cb87963deac562a4cd90dcc7