Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
6a796308ee9c3512dc9f4464a4ae609bf982162c22d094b51629cb92d5ff3f18.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a796308ee9c3512dc9f4464a4ae609bf982162c22d094b51629cb92d5ff3f18.dll
Resource
win10v2004-20240802-en
General
-
Target
6a796308ee9c3512dc9f4464a4ae609bf982162c22d094b51629cb92d5ff3f18.dll
-
Size
804KB
-
MD5
815ee202a4d7ce9b426947a9507e519f
-
SHA1
457c2493dd275dd6d2fb9c906355cbf91c8be385
-
SHA256
6a796308ee9c3512dc9f4464a4ae609bf982162c22d094b51629cb92d5ff3f18
-
SHA512
5afc20c655dbc82b0150235ced69062c918d5eff93da25bfc03e71ffa27076e0aec71d630dbfad64dce348018a67b4d78d6c20b7011a2900fbd32a7d6a4535e6
-
SSDEEP
12288:N2Mb5Ll6tJZEs9XqetTFQurW+18Rmf1RYG7:Nb5L+JZTXdFVrW+Zf1OG7
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1860 2760 rundll32.exe 82 PID 2760 wrote to memory of 1860 2760 rundll32.exe 82 PID 2760 wrote to memory of 1860 2760 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a796308ee9c3512dc9f4464a4ae609bf982162c22d094b51629cb92d5ff3f18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a796308ee9c3512dc9f4464a4ae609bf982162c22d094b51629cb92d5ff3f18.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1860
-