Overview
overview
10Static
static
10fcadf0a0a2...9d.exe
windows7-x64
7fcadf0a0a2...9d.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
37z/7z.dll
windows7-x64
17z/7z.dll
windows10-2004-x64
17z/7z.exe
windows7-x64
17z/7z.exe
windows10-2004-x64
1CalcHashAB.dll
windows7-x64
1CalcHashAB.dll
windows10-2004-x64
3Extxml2.dll
windows7-x64
3Extxml2.dll
windows10-2004-x64
3FatOperate.dll
windows7-x64
3FatOperate.dll
windows10-2004-x64
3FileHash.dll
windows7-x64
1FileHash.dll
windows10-2004-x64
3Initialize.dll
windows7-x64
6Initialize.dll
windows10-2004-x64
6LibSearchFileName.dll
windows7-x64
1LibSearchFileName.dll
windows10-2004-x64
1NamePipe.dll
windows7-x64
3NamePipe.dll
windows10-2004-x64
3NtfsOperate.dll
windows7-x64
1NtfsOperate.dll
windows10-2004-x64
1RecoveryPhoto.dll
windows7-x64
1RecoveryPhoto.dll
windows10-2004-x64
3SaveOperate.dll
windows7-x64
1SaveOperate.dll
windows10-2004-x64
1SoftwareLog.dll
windows7-x64
1SoftwareLog.dll
windows10-2004-x64
1Analysis
-
max time kernel
138s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 02:06
Behavioral task
behavioral1
Sample
fcadf0a0a2c90421f3b2b67f4649eabec2d0c8d4dda9127c7621de4ae052f09d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcadf0a0a2c90421f3b2b67f4649eabec2d0c8d4dda9127c7621de4ae052f09d.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
7z/7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
7z/7z.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
7z/7z.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
7z/7z.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
CalcHashAB.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
CalcHashAB.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Extxml2.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Extxml2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
FatOperate.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
FatOperate.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
FileHash.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
FileHash.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
Initialize.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Initialize.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
LibSearchFileName.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
LibSearchFileName.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
NamePipe.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
NamePipe.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
NtfsOperate.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
NtfsOperate.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
RecoveryPhoto.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
RecoveryPhoto.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
SaveOperate.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
SaveOperate.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
SoftwareLog.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
SoftwareLog.dll
Resource
win10v2004-20240412-en
General
-
Target
Initialize.dll
-
Size
146KB
-
MD5
f00b2f763b676ba3b7b39c92f769f018
-
SHA1
65c14e0ea372c3105187fedcd7204fd05d9e9a13
-
SHA256
6611dd0e8cded3aa1f029c0168355f12e51cccf4ec54d3408ca2891e2247818e
-
SHA512
b03daa1b075ad1877fd2ca10a818749d1a9308ef131c7e8583757a135e2e41c77d5c39fda13ac60fbed12287dd780f87dbb3a3d377c9877eba556ef67a5ee65e
-
SSDEEP
3072:n1pLEMzM8zaEa0ao5C2BSK/dzmZLPWVSIrIOl4kyoVe2uBpZqNBN:BBa10H5C2BS6daZqrIO3veNcV
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\M: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2944 wrote to memory of 1216 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 1216 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 1216 2944 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Initialize.dll,#12⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)