MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 314449ff757b308d440796441176566d3a6c17522dd75a8b24b70aab80458065. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 314449ff757b308d440796441176566d3a6c17522dd75a8b24b70aab80458065
SHA3-384 hash: 34eebcaa3038daac988d8d11f63fbe9b471c660478ebf78ab7ddad0e9fbed7b434dab78f1810d01b1bd4b04154e1722d
SHA1 hash: e9c1f298d0e41a4897f821aa3fd6fd8e3f5be12c
MD5 hash: c27b6ca789f70bbcf4c1fd5070387741
humanhash: kentucky-sodium-east-batman
File name:1.dll
Download: download sample
File size:573'440 bytes
First seen:2021-09-28 13:24:10 UTC
Last seen:2021-09-28 14:06:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4c49c23ab716b9b351a6402f026f79d5
ssdeep 3072:tdrxFTQMXa+EChvC5TDUgf/TRxjZd03tMLRIV+D3:U7aCFUGTjND3
Threatray 22 similar samples on MalwareBazaar
TLSH T121C413F8AD10D688F9D9A4BBE8D578055040BCECB1ABCF450454BB2A39E3485DB58ECF
Reporter James_inthe_box
Tags:dll exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1.dll
Verdict:
No threats detected
Analysis date:
2021-09-28 16:32:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the system32 subdirectories
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sigma detected: CobaltStrike Load by Rundll32
Sigma detected: UNC2452 Process Creation Patterns
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 492314 Sample: 1.dll Startdate: 28/09/2021 Architecture: WINDOWS Score: 84 136 Sigma detected: UNC2452 Process Creation Patterns 2->136 138 Sigma detected: CobaltStrike Load by Rundll32 2->138 14 loaddll64.exe 1 2->14         started        16 rundll32.exe 2->16         started        18 rundll32.exe 2->18         started        process3 process4 20 cmd.exe 1 14->20         started        23 rundll32.exe 14->23         started        25 rundll32.exe 14->25         started        27 rundll32.exe 14->27         started        signatures5 144 Uses ping.exe to sleep 20->144 146 Uses cmd line tools excessively to alter registry or file data 20->146 148 Uses ping.exe to check the status of other devices and networks 20->148 29 rundll32.exe 20->29         started        31 cmd.exe 1 23->31         started        35 cmd.exe 1 25->35         started        process6 dnsIp7 37 cmd.exe 1 29->37         started        124 192.0.2.20 unknown Reserved 31->124 126 Uses ping.exe to sleep 31->126 41 PING.EXE 1 31->41         started        43 rundll32.exe 31->43         started        45 conhost.exe 31->45         started        47 rundll32.exe 35->47         started        49 conhost.exe 35->49         started        51 timeout.exe 1 35->51         started        signatures8 process9 dnsIp10 116 127.0.0.1 unknown unknown 37->116 150 Uses ping.exe to sleep 37->150 53 rundll32.exe 37->53         started        55 PING.EXE 1 37->55         started        58 conhost.exe 37->58         started        118 192.0.2.207 unknown Reserved 41->118 60 cmd.exe 1 47->60         started        63 cmd.exe 1 47->63         started        signatures11 process12 dnsIp13 65 cmd.exe 1 53->65         started        67 cmd.exe 1 53->67         started        120 192.168.2.1 unknown unknown 55->120 152 Uses cmd line tools excessively to alter registry or file data 60->152 70 conhost.exe 60->70         started        72 reg.exe 1 60->72         started        74 rundll32.exe 63->74         started        76 conhost.exe 63->76         started        78 choice.exe 1 63->78         started        signatures14 process15 signatures16 80 rundll32.exe 65->80         started        83 conhost.exe 65->83         started        85 timeout.exe 1 65->85         started        140 Uses cmd line tools excessively to alter registry or file data 67->140 87 reg.exe 1 1 67->87         started        89 conhost.exe 67->89         started        process17 signatures18 128 Writes to foreign memory regions 80->128 130 Modifies the context of a thread in another process (thread injection) 80->130 132 Injects a PE file into a foreign processes 80->132 91 chrome.exe 80->91         started        94 cmd.exe 1 80->94         started        97 cmd.exe 1 80->97         started        134 Creates an autostart registry key pointing to binary in C:\Windows 87->134 process19 dnsIp20 122 167.172.108.158, 443, 49830 DIGITALOCEAN-ASNUS United States 91->122 99 cmd.exe 91->99         started        102 cmd.exe 91->102         started        104 cmd.exe 91->104         started        154 Uses cmd line tools excessively to alter registry or file data 94->154 106 reg.exe 1 94->106         started        108 conhost.exe 94->108         started        110 conhost.exe 97->110         started        112 reg.exe 97->112         started        signatures21 process22 signatures23 142 Uses cmd line tools excessively to alter registry or file data 99->142 114 conhost.exe 99->114         started        process24
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Runs ping.exe
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
314449ff757b308d440796441176566d3a6c17522dd75a8b24b70aab80458065
MD5 hash:
c27b6ca789f70bbcf4c1fd5070387741
SHA1 hash:
e9c1f298d0e41a4897f821aa3fd6fd8e3f5be12c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments