Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll
Resource
win10v2004-20240226-en
General
-
Target
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll
-
Size
1.4MB
-
MD5
28267ea322e3975f1e98c64a1c77f509
-
SHA1
e1d92e085df142d703ed9fd9c65ed92562a759fa
-
SHA256
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f
-
SHA512
2c0bd061a51e48c057fdd0b05dc959c48e79ef3df3ca1abec105b8be2aa53f416f92c109c23029a11d4d3e7e75529215877d41b5bfe5d462d844b3bae29c1a42
-
SSDEEP
24576:bSOCJ+Kt7ADfN0l6GMwF5fdn17nlz/Nz/9z/8z/Uz/Nz/Oz/aVuADDePddFkEPSr:JtTGIwloSpeQiMcRc/s+kobXnz/q/xnQ
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2928 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2928 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2928 2924 rundll32.exe 28 PID 2924 wrote to memory of 2928 2924 rundll32.exe 28 PID 2924 wrote to memory of 2928 2924 rundll32.exe 28 PID 2924 wrote to memory of 2928 2924 rundll32.exe 28 PID 2924 wrote to memory of 2928 2924 rundll32.exe 28 PID 2924 wrote to memory of 2928 2924 rundll32.exe 28 PID 2924 wrote to memory of 2928 2924 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5345e3700c5b584ca43a6748670480864
SHA190802b6139b4ad5c8b218e137af9e5466ad4d0fa
SHA256e952eeacb54e0d9c07da6db899c7012b49cfd19b19ec46b99321ebe831b53a7c
SHA5120c17385d336dd25b36e06c2c323694ec43683bf6c179985989eadd680df190bda220ddbd4afa548d6827877fdcfde06f67fd692ebe37653b574d00f5e377a566