Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 04:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b6c92b72a69a7510356a09686bdc452.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8b6c92b72a69a7510356a09686bdc452.dll
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
8b6c92b72a69a7510356a09686bdc452.dll
-
Size
212KB
-
MD5
8b6c92b72a69a7510356a09686bdc452
-
SHA1
b2aaadfaf8af6c1423e0f7c3f00f4df98e3770bb
-
SHA256
e4fd67f9e98b948adece9fd347e6c1d16b5e1d1e1bad876a95cb6b69678b7f3a
-
SHA512
32b052a69c8a00b8473f2f89186c36c0be9091f164f227cbefb579f9b5a1fc4815e7f51cf98cf7182feb35221cd0ea6b1616270ee63b444871921ca379f79eee
-
SSDEEP
6144:OUWHm5OkHwUDhjEG98hLz24Uk+8hhkxc:OUWEHVDhoThf24W8Tki
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-27-72356 rundll32.exe File created C:\Windows\SysWOW64\16731c rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2932 1940 rundll32.exe 28 PID 1940 wrote to memory of 2932 1940 rundll32.exe 28 PID 1940 wrote to memory of 2932 1940 rundll32.exe 28 PID 1940 wrote to memory of 2932 1940 rundll32.exe 28 PID 1940 wrote to memory of 2932 1940 rundll32.exe 28 PID 1940 wrote to memory of 2932 1940 rundll32.exe 28 PID 1940 wrote to memory of 2932 1940 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b6c92b72a69a7510356a09686bdc452.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b6c92b72a69a7510356a09686bdc452.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2932
-