Overview
overview
10Static
static
109b587f0574...1a.exe
windows7-x64
79b587f0574...1a.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
37z/7z.dll
windows7-x64
17z/7z.dll
windows10-2004-x64
17z/7z.exe
windows7-x64
17z/7z.exe
windows10-2004-x64
1CalcHashAB.dll
windows7-x64
1CalcHashAB.dll
windows10-2004-x64
3Extxml2.dll
windows7-x64
3Extxml2.dll
windows10-2004-x64
3FatOperate.dll
windows7-x64
1FatOperate.dll
windows10-2004-x64
3FileHash.dll
windows7-x64
1FileHash.dll
windows10-2004-x64
3Initialize.dll
windows7-x64
6Initialize.dll
windows10-2004-x64
6LibSearchFileName.dll
windows7-x64
1LibSearchFileName.dll
windows10-2004-x64
1NamePipe.dll
windows7-x64
3NamePipe.dll
windows10-2004-x64
3NtfsOperate.dll
windows7-x64
1NtfsOperate.dll
windows10-2004-x64
1RecoveryPhoto.dll
windows7-x64
1RecoveryPhoto.dll
windows10-2004-x64
3SaveOperate.dll
windows7-x64
1SaveOperate.dll
windows10-2004-x64
1SoftwareLog.dll
windows7-x64
1SoftwareLog.dll
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 01:43
Behavioral task
behavioral1
Sample
9b587f0574d013ada38f6973195e0ebcb1889952370dd3396e9f89e3622ff81a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9b587f0574d013ada38f6973195e0ebcb1889952370dd3396e9f89e3622ff81a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
7z/7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
7z/7z.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
7z/7z.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
7z/7z.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
CalcHashAB.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CalcHashAB.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Extxml2.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Extxml2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
FatOperate.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FatOperate.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
FileHash.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
FileHash.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
Initialize.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Initialize.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
LibSearchFileName.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
LibSearchFileName.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
NamePipe.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
NamePipe.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
NtfsOperate.dll
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
NtfsOperate.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
RecoveryPhoto.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
RecoveryPhoto.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
SaveOperate.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
SaveOperate.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
SoftwareLog.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
SoftwareLog.dll
Resource
win10v2004-20240412-en
General
-
Target
Initialize.dll
-
Size
146KB
-
MD5
53c0ecfc683dca385a9b2b45030a22c4
-
SHA1
71412c5aabfb6301eb24189268ad75865807711e
-
SHA256
c0fdcec60052f0b7007c6b02c98e55ac8cb338d015620b11c4f11a8b682f2080
-
SHA512
500e32a9651516f6004d39774b58476db87ebeaba7574e6ed725b492aa0836c22c4f66dcc6a53a580b06159c88779902a9edf19f9d383706dcf29a86c393e8b7
-
SSDEEP
3072:X1pLEMzM8zaEa0ao5C2BSK/dzmZLPWVSIrIOl4kyoVe2uBpZqNBd:RBa10H5C2BS6daZqrIO3veNc1
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4792 wrote to memory of 5064 4792 rundll32.exe rundll32.exe PID 4792 wrote to memory of 5064 4792 rundll32.exe rundll32.exe PID 4792 wrote to memory of 5064 4792 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#12⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)