Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll
Resource
win10v2004-20240611-en
General
-
Target
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll
-
Size
6.5MB
-
MD5
5e5d0725fae73f2339ac8ad604fd8a48
-
SHA1
0dd3dba62970aab2c59a2269a5e478a6e30cd6f0
-
SHA256
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9
-
SHA512
c583fc74c12eb9cd54596ca47b10bf1c4b3a491d7d2f076e60e685299d1fa25b63f58d8b664ebad0bdc151cf921bff79b758ea7e974aab455198fea6c3256158
-
SSDEEP
196608:mzUZ+x1t1GshUqgqehvBypSKs3c2SvO+L0mn:VZ+x1t1GshUVlByUKs3cVvOu0mn
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 680 rundll32.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4964 wrote to memory of 680 4964 rundll32.exe 82 PID 4964 wrote to memory of 680 4964 rundll32.exe 82 PID 4964 wrote to memory of 680 4964 rundll32.exe 82 PID 680 wrote to memory of 4032 680 rundll32.exe 87 PID 680 wrote to memory of 4032 680 rundll32.exe 87 PID 680 wrote to memory of 4032 680 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll,#12⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XYRgcZuFJuyvGgZJh"3⤵PID:4032
-
-