Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
b638540d1ae5650100ed8f6f8c6312fe.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b638540d1ae5650100ed8f6f8c6312fe.dll
Resource
win10v2004-20240226-en
General
-
Target
b638540d1ae5650100ed8f6f8c6312fe.dll
-
Size
100KB
-
MD5
b638540d1ae5650100ed8f6f8c6312fe
-
SHA1
bf3e624104483d37a14410a06aa45d109dc944c5
-
SHA256
dab4af84a18debe39f31ac4c8a1fa3c60bd3e58949a8da0f6dd18569ca061b87
-
SHA512
e2c2d84dc3fbdbab117337cbbdc1cc36581b7aecdfb26d4852131c088876880b31f41e0e886ce89c36a51d17c5540f11bd87b0c1ab8881d9d1b122d1cd53509d
-
SSDEEP
1536:txS0jwwkS0V6iMamgECUPjrQkNzh8GQnJi+R12fJTqammN:jNMw30giNtUwYzOGQJR12A7
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2680 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2680 1736 rundll32.exe 28 PID 1736 wrote to memory of 2680 1736 rundll32.exe 28 PID 1736 wrote to memory of 2680 1736 rundll32.exe 28 PID 1736 wrote to memory of 2680 1736 rundll32.exe 28 PID 1736 wrote to memory of 2680 1736 rundll32.exe 28 PID 1736 wrote to memory of 2680 1736 rundll32.exe 28 PID 1736 wrote to memory of 2680 1736 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b638540d1ae5650100ed8f6f8c6312fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b638540d1ae5650100ed8f6f8c6312fe.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2680
-