Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
c9637aa67fda7b0a85c88adaf2af989b.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c9637aa67fda7b0a85c88adaf2af989b.dll
Resource
win10v2004-20240226-en
General
-
Target
c9637aa67fda7b0a85c88adaf2af989b.dll
-
Size
14KB
-
MD5
c9637aa67fda7b0a85c88adaf2af989b
-
SHA1
ad5a653c6ceba74d39d8c8033df0a68d8bb20928
-
SHA256
9d57a2747b49f8614276bb2d40d6e01abc6e6470077942521b1653c624430970
-
SHA512
bcf94710254a9262db270b7b2aa545aa66210fce0f2b663ac078a3e03ab323eb67478afada435435017eae51b5d3fbb9c34de54621eab81e99c61792c13dcf9f
-
SSDEEP
192:IIJ/hqtlTcfAuS3dy7aauxO5mtxodUJ+hF1Rjj08O3mPbWGGKP5m4cm8:nphqbTKSNkaa0O5mbohlRjXzWY8
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 2132 rundll32.exe 7 2132 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2132 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2132 2260 rundll32.exe 28 PID 2260 wrote to memory of 2132 2260 rundll32.exe 28 PID 2260 wrote to memory of 2132 2260 rundll32.exe 28 PID 2260 wrote to memory of 2132 2260 rundll32.exe 28 PID 2260 wrote to memory of 2132 2260 rundll32.exe 28 PID 2260 wrote to memory of 2132 2260 rundll32.exe 28 PID 2260 wrote to memory of 2132 2260 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9637aa67fda7b0a85c88adaf2af989b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9637aa67fda7b0a85c88adaf2af989b.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6