Resubmissions
22-01-2021 13:50
210122-8mzgcvqz7j 822-01-2021 13:30
210122-9kfvyp6lrx 822-01-2021 13:27
210122-t61ddv7plj 10Analysis
-
max time kernel
127s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 13:50
Static task
static1
Behavioral task
behavioral1
Sample
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll
Resource
win10v20201028
General
-
Target
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll
-
Size
7.5MB
-
MD5
d88626469337e68200907f9c3573eb04
-
SHA1
9ac4991a8518166ac9b11bfca02045ba1c7822fd
-
SHA256
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698
-
SHA512
e6fbd55aeecf8d03bb621311918ddff34ed254ed580e4d2ce2d254f23c6dcfadb64f6701e61bd921042100f7f06ee112d7348d8c7ff0ba014a2a2ea8d8e28175
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
RUNDLL32.EXEflow pid process 17 2936 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exeRUNDLL32.EXEpowershell.exepid process 3452 powershell.exe 3452 powershell.exe 3452 powershell.exe 2936 RUNDLL32.EXE 2936 RUNDLL32.EXE 648 powershell.exe 648 powershell.exe 648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
regsvr32.exeRUNDLL32.EXEpowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 640 regsvr32.exe Token: SeDebugPrivilege 2936 RUNDLL32.EXE Token: SeDebugPrivilege 3452 powershell.exe Token: SeDebugPrivilege 648 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
RUNDLL32.EXEpid process 2936 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
regsvr32.exeregsvr32.exeRUNDLL32.EXEpowershell.exedescription pid process target process PID 3000 wrote to memory of 640 3000 regsvr32.exe regsvr32.exe PID 3000 wrote to memory of 640 3000 regsvr32.exe regsvr32.exe PID 3000 wrote to memory of 640 3000 regsvr32.exe regsvr32.exe PID 640 wrote to memory of 2936 640 regsvr32.exe RUNDLL32.EXE PID 640 wrote to memory of 2936 640 regsvr32.exe RUNDLL32.EXE PID 640 wrote to memory of 2936 640 regsvr32.exe RUNDLL32.EXE PID 2936 wrote to memory of 3452 2936 RUNDLL32.EXE powershell.exe PID 2936 wrote to memory of 3452 2936 RUNDLL32.EXE powershell.exe PID 2936 wrote to memory of 3452 2936 RUNDLL32.EXE powershell.exe PID 2936 wrote to memory of 648 2936 RUNDLL32.EXE powershell.exe PID 2936 wrote to memory of 648 2936 RUNDLL32.EXE powershell.exe PID 2936 wrote to memory of 648 2936 RUNDLL32.EXE powershell.exe PID 648 wrote to memory of 2668 648 powershell.exe nslookup.exe PID 648 wrote to memory of 2668 648 powershell.exe nslookup.exe PID 648 wrote to memory of 2668 648 powershell.exe nslookup.exe PID 2936 wrote to memory of 2280 2936 RUNDLL32.EXE schtasks.exe PID 2936 wrote to memory of 2280 2936 RUNDLL32.EXE schtasks.exe PID 2936 wrote to memory of 2280 2936 RUNDLL32.EXE schtasks.exe PID 2936 wrote to memory of 3928 2936 RUNDLL32.EXE schtasks.exe PID 2936 wrote to memory of 3928 2936 RUNDLL32.EXE schtasks.exe PID 2936 wrote to memory of 3928 2936 RUNDLL32.EXE schtasks.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll,eC9J3⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp54AD.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp6E04.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
47eebe401625bbc55e75dbfb72e9e89a
SHA1db3b2135942d2532c59b9788253638eb77e5995e
SHA256f1cd56000c44bbdb6880b5b133731f493fe8cba8198c5a861da6ae7b489ed0c3
SHA512590b149863d58be346e7927c28501375cc570858d2f156d234b03d68b86c5c0667a1038e2b6f6639172bf95638ca9f7c70f45270951abbcdf43b1be853b81d56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
19d57a3324590b202b143397934c6c85
SHA157cdf991a54b5786df26474aab4916b2093d5991
SHA2560207feeb1b960803fbcfca3706a3fea635fa66fd591f6679ea2c4a7d2010257c
SHA512a489ba3ee598667e211bde07b7b81d3dae61a2c6cfcb7a4b5ae8021077b74a1013c0fa2898e78e992389ad93e3e3be30a0c631a60e9664f04c332e808a6eb53f
-
C:\Users\Admin\AppData\Local\Temp\tmp54AD.tmp.ps1MD5
65a5a687fbe1797238ddcac533be15a8
SHA1276d1dcdeb312196a7eb77bc665d55e13b303060
SHA25604a5f08c6b26f7185321818443b6ab17b47cf51b5fb1c2f163e254f52c7dc2e7
SHA5121d6ac9f9210ea05865f20075aaf1fcfb1761b7b867b3c67c3ed9912b18b8d2c02ad984023381e971d4b80dacf81114a5d3ae0b10461b9038669eb7cbb47c9119
-
C:\Users\Admin\AppData\Local\Temp\tmp54AE.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
C:\Users\Admin\AppData\Local\Temp\tmp6E04.tmp.ps1MD5
f606452345b50838d9c61619f42b9b4b
SHA1016d5aa2c82adfd8943ba4475e2e9ec64e294e3e
SHA25659842052015ccb6733583a58194a0ceb395769d19f79a99e0d318e9505bbe059
SHA512cfd5258a27efb268cd84b1e4f129f285b8164c74c895db6a52e402f852c7f37cbf1138c02145234272c82028d1133abc0b67fbaaf07f920521a77b24916f334d
-
C:\Users\Admin\AppData\Local\Temp\tmp6E05.tmpMD5
1860260b2697808b80802352fe324782
SHA1f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b
SHA2560c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1
SHA512d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f
-
memory/640-3-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/640-7-0x0000000004180000-0x0000000004902000-memory.dmpFilesize
7.5MB
-
memory/640-8-0x00000000058C1000-0x0000000005F1E000-memory.dmpFilesize
6.4MB
-
memory/640-2-0x0000000000000000-mapping.dmp
-
memory/648-40-0x0000000007CF0000-0x0000000007CF1000-memory.dmpFilesize
4KB
-
memory/648-32-0x0000000000000000-mapping.dmp
-
memory/648-53-0x0000000006EA3000-0x0000000006EA4000-memory.dmpFilesize
4KB
-
memory/648-45-0x0000000006EA2000-0x0000000006EA3000-memory.dmpFilesize
4KB
-
memory/648-44-0x0000000006EA0000-0x0000000006EA1000-memory.dmpFilesize
4KB
-
memory/648-43-0x0000000008160000-0x0000000008161000-memory.dmpFilesize
4KB
-
memory/648-34-0x0000000070AF0000-0x00000000711DE000-memory.dmpFilesize
6.9MB
-
memory/2280-52-0x0000000000000000-mapping.dmp
-
memory/2668-50-0x0000000000000000-mapping.dmp
-
memory/2936-6-0x0000000000000000-mapping.dmp
-
memory/2936-10-0x0000000004DB0000-0x0000000005532000-memory.dmpFilesize
7.5MB
-
memory/2936-11-0x00000000064A1000-0x0000000006AFE000-memory.dmpFilesize
6.4MB
-
memory/3452-23-0x00000000088C0000-0x00000000088C1000-memory.dmpFilesize
4KB
-
memory/3452-15-0x0000000007630000-0x0000000007631000-memory.dmpFilesize
4KB
-
memory/3452-29-0x0000000009750000-0x0000000009751000-memory.dmpFilesize
4KB
-
memory/3452-14-0x0000000006FC0000-0x0000000006FC1000-memory.dmpFilesize
4KB
-
memory/3452-31-0x0000000004B63000-0x0000000004B64000-memory.dmpFilesize
4KB
-
memory/3452-27-0x0000000009F20000-0x0000000009F21000-memory.dmpFilesize
4KB
-
memory/3452-13-0x0000000071150000-0x000000007183E000-memory.dmpFilesize
6.9MB
-
memory/3452-26-0x00000000087E0000-0x00000000087E1000-memory.dmpFilesize
4KB
-
memory/3452-12-0x0000000000000000-mapping.dmp
-
memory/3452-28-0x00000000094B0000-0x00000000094B1000-memory.dmpFilesize
4KB
-
memory/3452-24-0x00000000086B0000-0x00000000086B1000-memory.dmpFilesize
4KB
-
memory/3452-16-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/3452-22-0x0000000008440000-0x0000000008441000-memory.dmpFilesize
4KB
-
memory/3452-21-0x0000000008030000-0x0000000008031000-memory.dmpFilesize
4KB
-
memory/3452-20-0x0000000007FC0000-0x0000000007FC1000-memory.dmpFilesize
4KB
-
memory/3452-19-0x0000000007D70000-0x0000000007D71000-memory.dmpFilesize
4KB
-
memory/3452-18-0x0000000007CD0000-0x0000000007CD1000-memory.dmpFilesize
4KB
-
memory/3452-17-0x0000000004B62000-0x0000000004B63000-memory.dmpFilesize
4KB
-
memory/3928-54-0x0000000000000000-mapping.dmp