Analysis
-
max time kernel
359s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 21:05
Behavioral task
behavioral1
Sample
rundll3.exe
Resource
win7-20240903-en
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
rundll3.exe
Resource
win10v2004-20240802-en
10 signatures
600 seconds
General
-
Target
rundll3.exe
-
Size
5.6MB
-
MD5
be8e765b8622989c5e4aa6414c2b030c
-
SHA1
b6cb7f1ffcceff8fbe572594ffc6aa515420e0a0
-
SHA256
6fdb160c3b7a5813f187afd606ef2e24cfde0e66e3a0663ce65cd1372fdc32ab
-
SHA512
e0522301c8d2c156fe6157d7d1ca3a305078ed35bd3a2cf1131bea2a97246eaa8e00751cb4ad9c63e26d97149bdf5898da6d443d8c224735c81589462bd571ad
-
SSDEEP
49152:YfPM6fbpCpuj2TCOHIiRO06E6M5UqdJtunHnVnzm5EatXXzihWGNggHL/rF2tZVb:GpRY2IEfm
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2988 rundll3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 AcroRd32.exe 2756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2756 2912 rundll32.exe 33 PID 2912 wrote to memory of 2756 2912 rundll32.exe 33 PID 2912 wrote to memory of 2756 2912 rundll32.exe 33 PID 2912 wrote to memory of 2756 2912 rundll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\rundll3.exe"C:\Users\Admin\AppData\Local\Temp\rundll3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\FindDisconnect.dll1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\FindDisconnect.dll"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756
-