Resubmissions
15-10-2020 13:31
201015-fye6cmvw2x 1015-10-2020 10:36
201015-lpwpgvvlrx 1007-10-2020 13:09
201007-gb8s3rc2dn 107-10-2020 04:33
201007-bq47zyvhf2 1Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
15-10-2020 13:31
Static task
static1
Behavioral task
behavioral1
Sample
adfde0367ba639980632da58a5444005.dll
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
adfde0367ba639980632da58a5444005.dll
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
adfde0367ba639980632da58a5444005.dll
-
Size
429KB
-
MD5
adfde0367ba639980632da58a5444005
-
SHA1
451dd7d059eb7fd22bb7bb46e64de0a1436e6dc3
-
SHA256
191bbf8eafbe5dfcf56bb139f36d44724bdb9fd1e708cd29dfd2d7b2b916f9f2
-
SHA512
1726d83df12cbd9c2a07322925253053720a65d986b4acbb356240afbbed63589c163c7dacaf9a00242769d32943241af2edc6be7ea80e52ee2b041e1843508e
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Oginwuq = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Soqin\\udpeym.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2120 set thread context of 1100 2120 rundll32.exe 77 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1100 msiexec.exe Token: SeSecurityPrivilege 1100 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3704 wrote to memory of 2120 3704 rundll32.exe 67 PID 3704 wrote to memory of 2120 3704 rundll32.exe 67 PID 3704 wrote to memory of 2120 3704 rundll32.exe 67 PID 2120 wrote to memory of 1100 2120 rundll32.exe 77 PID 2120 wrote to memory of 1100 2120 rundll32.exe 77 PID 2120 wrote to memory of 1100 2120 rundll32.exe 77 PID 2120 wrote to memory of 1100 2120 rundll32.exe 77 PID 2120 wrote to memory of 1100 2120 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\adfde0367ba639980632da58a5444005.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\adfde0367ba639980632da58a5444005.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-