Analysis
-
max time kernel
108s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
66cc2450c78ad2440415220037b2562b144eb3dc4da3ae066d6a1ea6d859ff08.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66cc2450c78ad2440415220037b2562b144eb3dc4da3ae066d6a1ea6d859ff08.dll
Resource
win10v2004-20240226-en
General
-
Target
66cc2450c78ad2440415220037b2562b144eb3dc4da3ae066d6a1ea6d859ff08.dll
-
Size
76KB
-
MD5
f6d3435e43871ba002706b346e854ada
-
SHA1
0db3626a8800d421c8b16298916a7655a73460de
-
SHA256
66cc2450c78ad2440415220037b2562b144eb3dc4da3ae066d6a1ea6d859ff08
-
SHA512
25e5a30fdd17dbca04e8f186bf76c3a412d2fb5af05b3bd4df699e0c80490f1e065d92361b0f861c3b34b20f26dfc600c9330801c5464d31cd6ca46a8e34a2d2
-
SSDEEP
768:VH/x7vUiZMBFYAjbvYlGLJTvToTPKz02zRHWSffsDzixF5C5o6ywojZ4U:VfxAuMEwCTPKz02hWwMzU/CrojZV
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1940 wrote to memory of 908 1940 rundll32.exe 85 PID 1940 wrote to memory of 908 1940 rundll32.exe 85 PID 1940 wrote to memory of 908 1940 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66cc2450c78ad2440415220037b2562b144eb3dc4da3ae066d6a1ea6d859ff08.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66cc2450c78ad2440415220037b2562b144eb3dc4da3ae066d6a1ea6d859ff08.dll,#12⤵
- Writes to the Master Boot Record (MBR)
PID:908
-