Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
de072ba5e4470ec687fe0fee114977cc.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
de072ba5e4470ec687fe0fee114977cc.dll
Resource
win10v2004-20240226-en
General
-
Target
de072ba5e4470ec687fe0fee114977cc.dll
-
Size
124KB
-
MD5
de072ba5e4470ec687fe0fee114977cc
-
SHA1
e7815d57f5f2adcfb9be12771b7299dbf6514d8b
-
SHA256
6f74459efbe1ecf22349f52d79c1f1ef45c4d72c136469fe18fad35d9b3c99b4
-
SHA512
967b34a460e4d3699f2af7837265c03fbfcf2bcd27f2f67d6d12d1b79a45b0f1cc9534cc6e926e539cd2502fba6022eecabfe818278c99de4d6b5cdcacb1e6ce
-
SSDEEP
1536:LHo6oWhXviWWQ/nVZl8h5xZQ7FYX4vQUy6wVThzzBqem:/hXviWD/v2h5xZQbvRwfzzBqe
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2980 2240 rundll32.exe 28 PID 2240 wrote to memory of 2980 2240 rundll32.exe 28 PID 2240 wrote to memory of 2980 2240 rundll32.exe 28 PID 2240 wrote to memory of 2980 2240 rundll32.exe 28 PID 2240 wrote to memory of 2980 2240 rundll32.exe 28 PID 2240 wrote to memory of 2980 2240 rundll32.exe 28 PID 2240 wrote to memory of 2980 2240 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de072ba5e4470ec687fe0fee114977cc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de072ba5e4470ec687fe0fee114977cc.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2980
-