Overview
overview
7Static
static
72a000bb220...bb.exe
windows7-x64
72a000bb220...bb.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...og.dll
windows7-x64
1$PLUGINSDI...og.dll
windows10-2004-x64
17z/7z.dll
windows7-x64
17z/7z.dll
windows10-2004-x64
17z/7z.exe
windows7-x64
17z/7z.exe
windows10-2004-x64
1CalcHashAB.dll
windows7-x64
1CalcHashAB.dll
windows10-2004-x64
3Extxml2.dll
windows7-x64
3Extxml2.dll
windows10-2004-x64
3FatOperate.dll
windows7-x64
1FatOperate.dll
windows10-2004-x64
3FileHash.dll
windows7-x64
1FileHash.dll
windows10-2004-x64
3FreeImage.dll
windows7-x64
3FreeImage.dll
windows10-2004-x64
3InfoReport.dll
windows7-x64
3InfoReport.dll
windows10-2004-x64
3Initialize.dll
windows7-x64
6Initialize.dll
windows10-2004-x64
6LibSearchFileName.dll
windows7-x64
1LibSearchFileName.dll
windows10-2004-x64
1NamePipe.dll
windows7-x64
3NamePipe.dll
windows10-2004-x64
3NtfsOperate.dll
windows7-x64
1NtfsOperate.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 01:14
Behavioral task
behavioral1
Sample
2a000bb220b57349cb25db153b3134bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a000bb220b57349cb25db153b3134bb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/SoftwareLog.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/SoftwareLog.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
7z/7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
7z/7z.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
7z/7z.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
7z/7z.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
CalcHashAB.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
CalcHashAB.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
Extxml2.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Extxml2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
FatOperate.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
FatOperate.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
FileHash.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
FileHash.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
FreeImage.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
FreeImage.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
InfoReport.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
InfoReport.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
Initialize.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Initialize.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
LibSearchFileName.dll
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
LibSearchFileName.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
NamePipe.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
NamePipe.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
NtfsOperate.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
NtfsOperate.dll
Resource
win10v2004-20231215-en
General
-
Target
Initialize.dll
-
Size
146KB
-
MD5
49cf7d9498d632ff8fe45799847ca3e0
-
SHA1
0510fe52c2c16b89fb53435f762e03ab7f406af5
-
SHA256
6f8d5cb5ed407c06fc651702c4eab2ed85557dc8f039f6c60a0c1f7c885d2603
-
SHA512
23a2e54abb0419986bfe282768d47fbd541b8277c8b416cfbb59e7ed6d3381789aedb1a6e75e8ae26d69f87beeb0c1e693b65eb11ca744508c3364b2c34bb051
-
SSDEEP
3072:W1pLEMzM8zaEa0ao5C2BSK/dzmZLPWVSIrIOl4kyoVe2uBpZqNBm:OBa10H5C2BS6daZqrIO3veNce
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4232 wrote to memory of 2376 4232 rundll32.exe 86 PID 4232 wrote to memory of 2376 4232 rundll32.exe 86 PID 4232 wrote to memory of 2376 4232 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#12⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
PID:2376
-