Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
06-04-2022 00:36
Static task
static1
Behavioral task
behavioral1
Sample
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe
Resource
win10v2004-20220331-en
General
-
Target
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe
-
Size
51KB
-
MD5
17fc78114bb7d62806f8adcb61652a62
-
SHA1
e4d8938b4c8fffc0d5773cf4748ab20174e79fb0
-
SHA256
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18
-
SHA512
f3e11258428add5654320a3aa8cc9b23db5bc7c40b8389c99a11ab66bad8e33fec3057d1462a6b709e23dff01b2ac116d9bbc15f3834f21aac02df2fe9e817d2
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ = "C:\\Windows\\SysWOW64\\rundll32.exe:*:Enabled:rundll32" rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 6 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Windows\SysWOW64\rbadmm.dll acprotect C:\Windows\SysWOW64\rbadmm.dll acprotect \Windows\SysWOW64\rbadmm.dll acprotect \Windows\SysWOW64\rbadmm.dll acprotect \Windows\SysWOW64\rbadmm.dll acprotect \Windows\SysWOW64\rbadmm.dll acprotect -
Drops file in Drivers directory 64 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\drivers\afd.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\amdsata.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\amdsbs.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\synth3dvsc.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\vmbus.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\BrFiltLo.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\circlass.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\nvstor.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\tcpipreg.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\usbccgp.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\mpio.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\mshidkmdf.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\stexstor.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\agp440.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\amdxata.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\atapi.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\intelppm.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\kbdhid.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\swenum.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\usbehci.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\wanarp.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\vgapnp.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\viaide.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\vwifibus.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\adpu320.sys rundll32.exe File created C:\Windows\SysWOW64\Drivers\Brserid.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\discache.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\lsi_sas.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\pcw.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\WudfPf.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\lsi_scsi.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\megasas.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\msisadrv.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\1394ohci.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\blbdrive.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\CmBatt.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\CompositeBus.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\ksthunk.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\processr.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\pacer.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\vms3cap.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\uliagpkx.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\vdrvroot.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\usbohci.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\tdpipe.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\tdx.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\tssecsrv.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\dmvsc.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\hcw85cir.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\HpSAMD.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\IPMIDrv.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\pcmcia.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\volmgr.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\vhdmp.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\hwpolicy.sys rundll32.exe File created C:\Windows\SysWOW64\Drivers\ksecdd.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\MSPCLOCK.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\ndis.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\SiSRaid2.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\wmiacpi.sys rundll32.exe File created C:\Windows\SysWOW64\Drivers\BrUsbMdm.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\hidir.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\mpsdrv.sys rundll32.exe File created C:\Windows\SysWOW64\DRIVERS\rdpbus.sys rundll32.exe -
Processes:
resource yara_rule \Windows\SysWOW64\rbadmm.dll upx C:\Windows\SysWOW64\rbadmm.dll upx \Windows\SysWOW64\rbadmm.dll upx \Windows\SysWOW64\rbadmm.dll upx \Windows\SysWOW64\rbadmm.dll upx \Windows\SysWOW64\rbadmm.dll upx -
Deletes itself 1 IoCs
Processes:
rundll32.exepid process 1724 rundll32.exe -
Loads dropped DLL 5 IoCs
Processes:
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exerundll32.exepid process 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies WinLogon 2 TTPs 8 IoCs
Processes:
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm\nuag = 975197305c465dc2309751970000000000000000 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm\DllName = "rbadmm.dll" 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm\Startup = "rbadmm" 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm\Impersonate = "1" 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm\Asynchronous = "1" 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rbadmm\MaxWait = "1" 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe -
Drops file in System32 directory 10 IoCs
Processes:
rundll32.exe2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exedescription ioc process File opened for modification C:\Windows\SysWOW64\hrpdcf.bin rundll32.exe File created C:\Windows\SysWOW64\CLFS.sys rundll32.exe File created C:\Windows\SysWOW64\hrpdcf.bin 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe File created C:\Windows\SysWOW64\rbadmm.dll 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe File created C:\Windows\SysWOW64\rbadma.sys 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe File opened for modification C:\Windows\SysWOW64\rbadma.sys 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe File opened for modification C:\Windows\SysWOW64\chinastar.key 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe File opened for modification C:\Windows\SysWOW64\hrpdcf.bin 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe File opened for modification C:\Windows\SysWOW64\chinastar.key rundll32.exe File opened for modification C:\Windows\SysWOW64\a99k.bin 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 748 1724 WerFault.exe rundll32.exe -
Processes:
rundll32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{2670000A-7350-4F3C-8081-5663EE0C6C49} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1724 rundll32.exe -
Suspicious behavior: LoadsDriver 64 IoCs
Processes:
rundll32.exepid process 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exerundll32.exedescription pid process target process PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1648 wrote to memory of 1724 1648 2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe rundll32.exe PID 1724 wrote to memory of 748 1724 rundll32.exe WerFault.exe PID 1724 wrote to memory of 748 1724 rundll32.exe WerFault.exe PID 1724 wrote to memory of 748 1724 rundll32.exe WerFault.exe PID 1724 wrote to memory of 748 1724 rundll32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe"C:\Users\Admin\AppData\Local\Temp\2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe rbadmm.dll,rbadmm C:\Users\Admin\AppData\Local\Temp\2cc7714f5b1d89fd90aa73df48f1770f1e7222553fe1955542ca82194f114d18.exe2⤵
- Modifies firewall policy service
- Drops file in Drivers directory
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 6083⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\hrpdcf.binFilesize
7KB
MD54dc994a8bbd3ef7a409d16141032489f
SHA1b0ac6609eac17fab8ce1ce4f3442160a50774ad4
SHA25665eec26baa5515b7afcfe88c3ade411a57cb4c91c6f0d4f22f97bf523e3dae7e
SHA5121279dc39b637a05efbf4099c21432e3b7b9c55c3e7b6e5c607b3ba5be794cd8ffbdf0bba37259fa8a1de74c90dc986afaef0f11f9c6a52cd77341e967fa0806f
-
C:\Windows\SysWOW64\rbadma.sysFilesize
8KB
MD58cafd4ebdfb735746534e6c6f934e9ba
SHA1d2e07a2e5c9096ca13821587fbaa818609ad99a2
SHA25662e0bf77e717faa17a0642ad4948b0e035bc56663ef8ae4a71020968066fd70b
SHA512fa2266c919bf44499efaeb47e860dd28848800b26192884e2de1e3610e07a35b2ae43dffa5413b498fb28c680b2d7738d856a54da78f0287993cfd2e03cef96e
-
C:\Windows\SysWOW64\rbadmm.dllFilesize
22KB
MD535d616600354d93a3a6ded2ee45838f2
SHA14b362eac596d917647e602f59a89a3c7a0b1e654
SHA256c9f1d95170e1109eb36952d69d53e5d68ffe9b3b926bde03aef2fd521982087c
SHA51292a039c0441a4abf0b3b0b0f6452ea8c2e682e5f766b64d2c910443ce5960a80a71121e4ba30fdea0ef8f8aefd37c4cddc267c376759534f07a714a14cea4c99
-
\Windows\SysWOW64\rbadmm.dllFilesize
22KB
MD535d616600354d93a3a6ded2ee45838f2
SHA14b362eac596d917647e602f59a89a3c7a0b1e654
SHA256c9f1d95170e1109eb36952d69d53e5d68ffe9b3b926bde03aef2fd521982087c
SHA51292a039c0441a4abf0b3b0b0f6452ea8c2e682e5f766b64d2c910443ce5960a80a71121e4ba30fdea0ef8f8aefd37c4cddc267c376759534f07a714a14cea4c99
-
\Windows\SysWOW64\rbadmm.dllFilesize
22KB
MD535d616600354d93a3a6ded2ee45838f2
SHA14b362eac596d917647e602f59a89a3c7a0b1e654
SHA256c9f1d95170e1109eb36952d69d53e5d68ffe9b3b926bde03aef2fd521982087c
SHA51292a039c0441a4abf0b3b0b0f6452ea8c2e682e5f766b64d2c910443ce5960a80a71121e4ba30fdea0ef8f8aefd37c4cddc267c376759534f07a714a14cea4c99
-
\Windows\SysWOW64\rbadmm.dllFilesize
22KB
MD535d616600354d93a3a6ded2ee45838f2
SHA14b362eac596d917647e602f59a89a3c7a0b1e654
SHA256c9f1d95170e1109eb36952d69d53e5d68ffe9b3b926bde03aef2fd521982087c
SHA51292a039c0441a4abf0b3b0b0f6452ea8c2e682e5f766b64d2c910443ce5960a80a71121e4ba30fdea0ef8f8aefd37c4cddc267c376759534f07a714a14cea4c99
-
\Windows\SysWOW64\rbadmm.dllFilesize
22KB
MD535d616600354d93a3a6ded2ee45838f2
SHA14b362eac596d917647e602f59a89a3c7a0b1e654
SHA256c9f1d95170e1109eb36952d69d53e5d68ffe9b3b926bde03aef2fd521982087c
SHA51292a039c0441a4abf0b3b0b0f6452ea8c2e682e5f766b64d2c910443ce5960a80a71121e4ba30fdea0ef8f8aefd37c4cddc267c376759534f07a714a14cea4c99
-
\Windows\SysWOW64\rbadmm.dllFilesize
22KB
MD535d616600354d93a3a6ded2ee45838f2
SHA14b362eac596d917647e602f59a89a3c7a0b1e654
SHA256c9f1d95170e1109eb36952d69d53e5d68ffe9b3b926bde03aef2fd521982087c
SHA51292a039c0441a4abf0b3b0b0f6452ea8c2e682e5f766b64d2c910443ce5960a80a71121e4ba30fdea0ef8f8aefd37c4cddc267c376759534f07a714a14cea4c99
-
memory/748-64-0x0000000000000000-mapping.dmp
-
memory/1724-55-0x0000000000000000-mapping.dmp
-
memory/1724-56-0x00000000754A1000-0x00000000754A3000-memory.dmpFilesize
8KB