Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f.dll
Resource
win10v2004-20240412-en
General
-
Target
3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f.dll
-
Size
956KB
-
MD5
b28a478eb5b99efcdc7caf428bffb89a
-
SHA1
d394c7b8fe15753bfbff79fb4f648f6f8bae70f9
-
SHA256
3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f
-
SHA512
decb2581f64949bfaaaf0368917f0705d7a4b7392ec272eda025cf06a4384ec4cdd5202081c2e085f00645029dd96bfef262e8628bed1861185adf6281c1cc88
-
SSDEEP
24576:rs6ZRS5J3ifJvlxfcdaeti7w+0bf0XznPMvPD:Yni8dK9CEMXD
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2952 rundll32.exe 4 2952 rundll32.exe 5 2952 rundll32.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2952 2232 rundll32.exe 28 PID 2232 wrote to memory of 2952 2232 rundll32.exe 28 PID 2232 wrote to memory of 2952 2232 rundll32.exe 28 PID 2232 wrote to memory of 2952 2232 rundll32.exe 28 PID 2232 wrote to memory of 2952 2232 rundll32.exe 28 PID 2232 wrote to memory of 2952 2232 rundll32.exe 28 PID 2232 wrote to memory of 2952 2232 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f.dll,#12⤵
- Blocklisted process makes network request
PID:2952
-