Overview
overview
10Static
static
104823257b6e...17.exe
windows7-x64
74823257b6e...17.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...og.dll
windows7-x64
1$PLUGINSDI...og.dll
windows10-2004-x64
17z/7z.dll
windows7-x64
17z/7z.dll
windows10-2004-x64
17z/7z.exe
windows7-x64
17z/7z.exe
windows10-2004-x64
1CalcHashAB.dll
windows7-x64
1CalcHashAB.dll
windows10-2004-x64
3Extxml2.dll
windows7-x64
3Extxml2.dll
windows10-2004-x64
3FatOperate.dll
windows7-x64
1FatOperate.dll
windows10-2004-x64
3FileHash.dll
windows7-x64
1FileHash.dll
windows10-2004-x64
3FreeImage.dll
windows7-x64
3FreeImage.dll
windows10-2004-x64
3InfoReport.dll
windows7-x64
3InfoReport.dll
windows10-2004-x64
3Initialize.dll
windows7-x64
6Initialize.dll
windows10-2004-x64
6LibSearchFileName.dll
windows7-x64
1LibSearchFileName.dll
windows10-2004-x64
1NamePipe.dll
windows7-x64
3NamePipe.dll
windows10-2004-x64
3NtfsOperate.dll
windows7-x64
1NtfsOperate.dll
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 01:17
Behavioral task
behavioral1
Sample
4823257b6e91618705a5f1459308365cd3392d2a5e9164e0318a5eee7173d717.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4823257b6e91618705a5f1459308365cd3392d2a5e9164e0318a5eee7173d717.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/SoftwareLog.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/SoftwareLog.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
7z/7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
7z/7z.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
7z/7z.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
7z/7z.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
CalcHashAB.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
CalcHashAB.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Extxml2.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Extxml2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
FatOperate.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
FatOperate.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
FileHash.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
FileHash.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
FreeImage.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
FreeImage.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
InfoReport.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
InfoReport.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
Initialize.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Initialize.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
LibSearchFileName.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
LibSearchFileName.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
NamePipe.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
NamePipe.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
NtfsOperate.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
NtfsOperate.dll
Resource
win10v2004-20240412-en
General
-
Target
Initialize.dll
-
Size
146KB
-
MD5
10cb1b6427829e32b05e87485218acf7
-
SHA1
a6a450edf2e1e00a3a1e74d9c496ac69927eb5bf
-
SHA256
2556c880c38f86f0b8addbb2edfb2a86e4a9cf1c78a5b9dc9783dada68a964dc
-
SHA512
6251356da8a3a07c4cbe644b459be386267c8c3abbdb215839fb204d770807634ea6d980cc9d2fb92cedd0a9bbb4202936feb553f833a6aa7d47d05f02085314
-
SSDEEP
3072:D1pLEMzM8zaEa0ao5C2BSK/dzmZLPWVSIrIOl4kyoVe2uBpZqNB+:dBa10H5C2BS6daZqrIO3veNcG
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4464 wrote to memory of 4316 4464 rundll32.exe rundll32.exe PID 4464 wrote to memory of 4316 4464 rundll32.exe rundll32.exe PID 4464 wrote to memory of 4316 4464 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#12⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:1904