Analysis
-
max time kernel
150s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60.dll
Resource
win10v2004-20220414-en
General
-
Target
8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60.dll
-
Size
970KB
-
MD5
c57bd52b697bb4e7d84966e7e1060dcf
-
SHA1
bcae0790539d3753a5ddf7707a12068c3733a3b2
-
SHA256
8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60
-
SHA512
61d3830fe1d54f80ef1a5cb03f272f9148f897ceb132537c66117a287770fe48dc74a1a3e291c011c18c467ebeaf73b3b9f79802760bc6d8504b0ccd02cd3f0a
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Taskmgr.exephoneactivate.exeSystemPropertiesRemote.exepid process 3292 Taskmgr.exe 4588 phoneactivate.exe 4224 SystemPropertiesRemote.exe -
Loads dropped DLL 3 IoCs
Processes:
Taskmgr.exephoneactivate.exeSystemPropertiesRemote.exepid process 3292 Taskmgr.exe 4588 phoneactivate.exe 4224 SystemPropertiesRemote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Erihzxqqayujs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\ctglJxMzsP\\phoneactivate.exe" -
Processes:
phoneactivate.exeSystemPropertiesRemote.exerundll32.exeTaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3480 rundll32.exe 3480 rundll32.exe 3480 rundll32.exe 3480 rundll32.exe 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 2668 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2668 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2668 wrote to memory of 2780 2668 Taskmgr.exe PID 2668 wrote to memory of 2780 2668 Taskmgr.exe PID 2668 wrote to memory of 3292 2668 Taskmgr.exe PID 2668 wrote to memory of 3292 2668 Taskmgr.exe PID 2668 wrote to memory of 1548 2668 phoneactivate.exe PID 2668 wrote to memory of 1548 2668 phoneactivate.exe PID 2668 wrote to memory of 4588 2668 phoneactivate.exe PID 2668 wrote to memory of 4588 2668 phoneactivate.exe PID 2668 wrote to memory of 4804 2668 SystemPropertiesRemote.exe PID 2668 wrote to memory of 4804 2668 SystemPropertiesRemote.exe PID 2668 wrote to memory of 4224 2668 SystemPropertiesRemote.exe PID 2668 wrote to memory of 4224 2668 SystemPropertiesRemote.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Taskmgr.exeC:\Windows\system32\Taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\o8nc\Taskmgr.exeC:\Users\Admin\AppData\Local\o8nc\Taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵
-
C:\Users\Admin\AppData\Local\1hwuODKUX\phoneactivate.exeC:\Users\Admin\AppData\Local\1hwuODKUX\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵
-
C:\Users\Admin\AppData\Local\MT95cw\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\MT95cw\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1hwuODKUX\SLC.dllFilesize
972KB
MD566a8d76cb1e20d7aee7b8a23b116d782
SHA1277fbf0f61530fe50e6d5ee07509c00e42c0a240
SHA2568b7f74ac92ae5d7be56d0a04bc9a904b98940cb368b190c64b5eef604c25d881
SHA512aeaf9b2c282d851bc447e09c8e6883861bfbe6bacb4a4ac25db0fa4bb07c76b6411d0d743c4615b099e028178747cb07e8b0fcfa1b8a810ea78bcf568bef1ec2
-
C:\Users\Admin\AppData\Local\1hwuODKUX\SLC.dllFilesize
972KB
MD566a8d76cb1e20d7aee7b8a23b116d782
SHA1277fbf0f61530fe50e6d5ee07509c00e42c0a240
SHA2568b7f74ac92ae5d7be56d0a04bc9a904b98940cb368b190c64b5eef604c25d881
SHA512aeaf9b2c282d851bc447e09c8e6883861bfbe6bacb4a4ac25db0fa4bb07c76b6411d0d743c4615b099e028178747cb07e8b0fcfa1b8a810ea78bcf568bef1ec2
-
C:\Users\Admin\AppData\Local\1hwuODKUX\phoneactivate.exeFilesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
C:\Users\Admin\AppData\Local\MT95cw\SYSDM.CPLFilesize
971KB
MD5f9fa86747b5ac57531268b4e49e4b92b
SHA1f032f23bf8f16ed66d715132e6521ee5b14ea11a
SHA2568f374bdc9efd9a9f75d9beba39b1180ba6c650b2ffd396e0f080aa5a59c0a994
SHA5122c7b3b9315a44b70fd478e450730bdb73d60a1cf8290f6b21cdc05e22e61428931d9d27e5b480fc248165345eac1cd3d4e3e1dcca0aac04147efa75a0767e599
-
C:\Users\Admin\AppData\Local\MT95cw\SYSDM.CPLFilesize
971KB
MD5f9fa86747b5ac57531268b4e49e4b92b
SHA1f032f23bf8f16ed66d715132e6521ee5b14ea11a
SHA2568f374bdc9efd9a9f75d9beba39b1180ba6c650b2ffd396e0f080aa5a59c0a994
SHA5122c7b3b9315a44b70fd478e450730bdb73d60a1cf8290f6b21cdc05e22e61428931d9d27e5b480fc248165345eac1cd3d4e3e1dcca0aac04147efa75a0767e599
-
C:\Users\Admin\AppData\Local\MT95cw\SystemPropertiesRemote.exeFilesize
82KB
MD5cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
C:\Users\Admin\AppData\Local\o8nc\DUser.dllFilesize
975KB
MD5659001881b1f16daeffb12b163cd6a15
SHA12deb456682d392e59551ac348d4561268e555f35
SHA256eb58e109328dea7a9f05e4375e4a9c60046fb2000b41138080f20f802ee3c8f2
SHA5125ad59e2fcfa306438ff08ae07de4ee5428ebe195d6e42949fe824271927467789da56272c5ce07c7426250de8a8c66ddd08edc64fdcbb0d87e67b376c77343b6
-
C:\Users\Admin\AppData\Local\o8nc\DUser.dllFilesize
975KB
MD5659001881b1f16daeffb12b163cd6a15
SHA12deb456682d392e59551ac348d4561268e555f35
SHA256eb58e109328dea7a9f05e4375e4a9c60046fb2000b41138080f20f802ee3c8f2
SHA5125ad59e2fcfa306438ff08ae07de4ee5428ebe195d6e42949fe824271927467789da56272c5ce07c7426250de8a8c66ddd08edc64fdcbb0d87e67b376c77343b6
-
C:\Users\Admin\AppData\Local\o8nc\Taskmgr.exeFilesize
1.2MB
MD558d5bc7895f7f32ee308e34f06f25dd5
SHA17a7f5e991ddeaf73e15a0fdcb5c999c0248a2fa4
SHA2564e305198f15bafd5728b5fb8e7ff48d9f312399c744ecfea0ecac79d93c5e478
SHA512872c84c92b0e4050ae4a4137330ec3cda30008fd15d6413bf7a913c03a021ad41b6131e5a7356b374ced98d37ae207147ebefd93893560dc15c3e9875f93f7a9
-
memory/2668-139-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-141-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-136-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-146-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-155-0x00000000024D0000-0x00000000024D7000-memory.dmpFilesize
28KB
-
memory/2668-156-0x00007FF9D5210000-0x00007FF9D5220000-memory.dmpFilesize
64KB
-
memory/2668-143-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-140-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-142-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-138-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-145-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-144-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2668-137-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/3292-164-0x00000187240F0000-0x00000187240F7000-memory.dmpFilesize
28KB
-
memory/3292-157-0x0000000000000000-mapping.dmp
-
memory/3292-161-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3480-131-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/3480-135-0x000001CE8E530000-0x000001CE8E537000-memory.dmpFilesize
28KB
-
memory/4224-183-0x0000010743360000-0x0000010743367000-memory.dmpFilesize
28KB
-
memory/4224-175-0x0000000000000000-mapping.dmp
-
memory/4588-174-0x000001DC0E370000-0x000001DC0E377000-memory.dmpFilesize
28KB
-
memory/4588-170-0x0000000140000000-0x00000001400FB000-memory.dmpFilesize
1004KB
-
memory/4588-166-0x0000000000000000-mapping.dmp