Resubmissions
22-01-2021 13:50
210122-8mzgcvqz7j 822-01-2021 13:30
210122-9kfvyp6lrx 822-01-2021 13:27
210122-t61ddv7plj 10Analysis
-
max time kernel
127s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 13:50
Static task
static1
Behavioral task
behavioral1
Sample
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll
Resource
win10v20201028
General
-
Target
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll
-
Size
7.5MB
-
MD5
d88626469337e68200907f9c3573eb04
-
SHA1
9ac4991a8518166ac9b11bfca02045ba1c7822fd
-
SHA256
06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698
-
SHA512
e6fbd55aeecf8d03bb621311918ddff34ed254ed580e4d2ce2d254f23c6dcfadb64f6701e61bd921042100f7f06ee112d7348d8c7ff0ba014a2a2ea8d8e28175
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 17 2936 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3452 powershell.exe 3452 powershell.exe 3452 powershell.exe 2936 RUNDLL32.EXE 2936 RUNDLL32.EXE 648 powershell.exe 648 powershell.exe 648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 640 regsvr32.exe Token: SeDebugPrivilege 2936 RUNDLL32.EXE Token: SeDebugPrivilege 3452 powershell.exe Token: SeDebugPrivilege 648 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3000 wrote to memory of 640 3000 regsvr32.exe 72 PID 3000 wrote to memory of 640 3000 regsvr32.exe 72 PID 3000 wrote to memory of 640 3000 regsvr32.exe 72 PID 640 wrote to memory of 2936 640 regsvr32.exe 77 PID 640 wrote to memory of 2936 640 regsvr32.exe 77 PID 640 wrote to memory of 2936 640 regsvr32.exe 77 PID 2936 wrote to memory of 3452 2936 RUNDLL32.EXE 81 PID 2936 wrote to memory of 3452 2936 RUNDLL32.EXE 81 PID 2936 wrote to memory of 3452 2936 RUNDLL32.EXE 81 PID 2936 wrote to memory of 648 2936 RUNDLL32.EXE 84 PID 2936 wrote to memory of 648 2936 RUNDLL32.EXE 84 PID 2936 wrote to memory of 648 2936 RUNDLL32.EXE 84 PID 648 wrote to memory of 2668 648 powershell.exe 86 PID 648 wrote to memory of 2668 648 powershell.exe 86 PID 648 wrote to memory of 2668 648 powershell.exe 86 PID 2936 wrote to memory of 2280 2936 RUNDLL32.EXE 87 PID 2936 wrote to memory of 2280 2936 RUNDLL32.EXE 87 PID 2936 wrote to memory of 2280 2936 RUNDLL32.EXE 87 PID 2936 wrote to memory of 3928 2936 RUNDLL32.EXE 89 PID 2936 wrote to memory of 3928 2936 RUNDLL32.EXE 89 PID 2936 wrote to memory of 3928 2936 RUNDLL32.EXE 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\06456edb20ab947356811ad8ce3a16ae3ea702342163b67907217a3d28b6d698.dll,eC9J3⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp54AD.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp6E04.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵PID:2668
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:2280
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:3928
-
-
-