Analysis
-
max time kernel
131s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 23:24
Behavioral task
behavioral1
Sample
7b2a2ca15aeb3c2645f67609fae68955bb1fe9491b5ce00421c89a458eb66ff9.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b2a2ca15aeb3c2645f67609fae68955bb1fe9491b5ce00421c89a458eb66ff9.dll
Resource
win10v2004-20240426-en
General
-
Target
7b2a2ca15aeb3c2645f67609fae68955bb1fe9491b5ce00421c89a458eb66ff9.dll
-
Size
165KB
-
MD5
8f281fbf6318e63a85d4d899889d2258
-
SHA1
7da2ae93b7a1efede0a8ef7f0f7000ab43390645
-
SHA256
7b2a2ca15aeb3c2645f67609fae68955bb1fe9491b5ce00421c89a458eb66ff9
-
SHA512
0084083e3844c37d08ee0f5449119785d58d3a99f85a88a52026c3cc5a636034ec0b58658de5978859b9406d29e1463be121621a771da79a3e6fec96ba4a3237
-
SSDEEP
3072:QG5F/vIb0ekzuNShJCtytiz/Unl1HTA6oO11g3UhA:QWF/v8ShJCtytiz/YzT5ng
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 4960 rundll32.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4960 rundll32.exe 4960 rundll32.exe 4960 rundll32.exe 4960 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4960 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4960 3184 rundll32.exe 83 PID 3184 wrote to memory of 4960 3184 rundll32.exe 83 PID 3184 wrote to memory of 4960 3184 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b2a2ca15aeb3c2645f67609fae68955bb1fe9491b5ce00421c89a458eb66ff9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b2a2ca15aeb3c2645f67609fae68955bb1fe9491b5ce00421c89a458eb66ff9.dll,#12⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4960
-