Analysis
-
max time kernel
153s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll
Resource
win10v2004-20220414-en
General
-
Target
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll
-
Size
1.2MB
-
MD5
f15fa93fc3fc644f39f866875f3a69b7
-
SHA1
6a5c36ae6673e150502f07fd23677fc76033fa06
-
SHA256
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add
-
SHA512
ab2f22a9496b2e51f387498b5d8933912221c4e7a5fd141ac5b0b964832c7565291e2db7db13cc06782c2c36f0144d265bb2ede24308eafd1e21bc283bad8d90
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
GamePanel.exeBitLockerWizard.exeCloudNotifications.exepid process 4536 GamePanel.exe 4488 BitLockerWizard.exe 1660 CloudNotifications.exe -
Loads dropped DLL 3 IoCs
Processes:
GamePanel.exeBitLockerWizard.exeCloudNotifications.exepid process 4536 GamePanel.exe 4488 BitLockerWizard.exe 1660 CloudNotifications.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mozskmmhgssfnvj = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\11bj\\BitLockerWizard.exe" -
Processes:
rundll32.exeGamePanel.exeBitLockerWizard.exeCloudNotifications.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3260 rundll32.exe 3260 rundll32.exe 3260 rundll32.exe 3260 rundll32.exe 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 2092 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2092 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2092 wrote to memory of 1104 2092 GamePanel.exe PID 2092 wrote to memory of 1104 2092 GamePanel.exe PID 2092 wrote to memory of 4536 2092 GamePanel.exe PID 2092 wrote to memory of 4536 2092 GamePanel.exe PID 2092 wrote to memory of 2840 2092 BitLockerWizard.exe PID 2092 wrote to memory of 2840 2092 BitLockerWizard.exe PID 2092 wrote to memory of 4488 2092 BitLockerWizard.exe PID 2092 wrote to memory of 4488 2092 BitLockerWizard.exe PID 2092 wrote to memory of 3224 2092 CloudNotifications.exe PID 2092 wrote to memory of 3224 2092 CloudNotifications.exe PID 2092 wrote to memory of 1660 2092 CloudNotifications.exe PID 2092 wrote to memory of 1660 2092 CloudNotifications.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵
-
C:\Users\Admin\AppData\Local\cjG\GamePanel.exeC:\Users\Admin\AppData\Local\cjG\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\iecoR\BitLockerWizard.exeC:\Users\Admin\AppData\Local\iecoR\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵
-
C:\Users\Admin\AppData\Local\garAdRgM\CloudNotifications.exeC:\Users\Admin\AppData\Local\garAdRgM\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\cjG\GamePanel.exeFilesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
C:\Users\Admin\AppData\Local\cjG\dwmapi.dllFilesize
1.2MB
MD545b3cc16bf04867f9c3dd3286cfcced8
SHA1c2eb1e5f650ae756610c2fceef9b79cade024a39
SHA2565038fc075ec43bf121563750bce0b7ab433a75948727afb73594e845f9160069
SHA5128b9e732a2d886eadefae77ed0765cde8de018ffdfc093534304dab2e533dcec378d22ebba976cd443598213d9b9b60bd9af4bdd66919330190bac1e87812e7ea
-
C:\Users\Admin\AppData\Local\cjG\dwmapi.dllFilesize
1.2MB
MD545b3cc16bf04867f9c3dd3286cfcced8
SHA1c2eb1e5f650ae756610c2fceef9b79cade024a39
SHA2565038fc075ec43bf121563750bce0b7ab433a75948727afb73594e845f9160069
SHA5128b9e732a2d886eadefae77ed0765cde8de018ffdfc093534304dab2e533dcec378d22ebba976cd443598213d9b9b60bd9af4bdd66919330190bac1e87812e7ea
-
C:\Users\Admin\AppData\Local\garAdRgM\CloudNotifications.exeFilesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
C:\Users\Admin\AppData\Local\garAdRgM\UxTheme.dllFilesize
1.2MB
MD59a7b067ef27759b8fbe358400908cab8
SHA1ea604f335583acbb7b1db905093a40a99d79637a
SHA256d0a8326bb9f59a624391597f3fff1eb3977d1b7c388d0cf9ae1bf1d519c8e50f
SHA5127febb2f9cd324df178f18d38360f74e63a473a3c2646de3fce503ecd29ce56a7fdb8194ec36a57cb03b25f1f164c92e5a2debd89d0c71efbb5aa07e29b9d04d3
-
C:\Users\Admin\AppData\Local\garAdRgM\UxTheme.dllFilesize
1.2MB
MD59a7b067ef27759b8fbe358400908cab8
SHA1ea604f335583acbb7b1db905093a40a99d79637a
SHA256d0a8326bb9f59a624391597f3fff1eb3977d1b7c388d0cf9ae1bf1d519c8e50f
SHA5127febb2f9cd324df178f18d38360f74e63a473a3c2646de3fce503ecd29ce56a7fdb8194ec36a57cb03b25f1f164c92e5a2debd89d0c71efbb5aa07e29b9d04d3
-
C:\Users\Admin\AppData\Local\iecoR\BitLockerWizard.exeFilesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
C:\Users\Admin\AppData\Local\iecoR\FVEWIZ.dllFilesize
1.2MB
MD580746882892c623884fdccb3ee94c80c
SHA160a04490618452999acc1ae39c86666c3b73860c
SHA256675452f5765b4307821510d371d03b79add4a5f5fb0fdee441fc0df957cc853c
SHA5125ef038515b61b8e3e19cfd604ce99e0e01a6516b4a837904c23b59ff0d9651d24225b7a614c7979def2280530c243c0811abe57c770a6c5b7443361409b1a256
-
C:\Users\Admin\AppData\Local\iecoR\FVEWIZ.dllFilesize
1.2MB
MD580746882892c623884fdccb3ee94c80c
SHA160a04490618452999acc1ae39c86666c3b73860c
SHA256675452f5765b4307821510d371d03b79add4a5f5fb0fdee441fc0df957cc853c
SHA5125ef038515b61b8e3e19cfd604ce99e0e01a6516b4a837904c23b59ff0d9651d24225b7a614c7979def2280530c243c0811abe57c770a6c5b7443361409b1a256
-
memory/1660-182-0x0000023CEEE40000-0x0000023CEEE47000-memory.dmpFilesize
28KB
-
memory/1660-174-0x0000000000000000-mapping.dmp
-
memory/2092-155-0x00007FFBF29D0000-0x00007FFBF29E0000-memory.dmpFilesize
64KB
-
memory/2092-140-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-154-0x0000000000750000-0x0000000000757000-memory.dmpFilesize
28KB
-
memory/2092-136-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-135-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-144-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-139-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-143-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-138-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-137-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-145-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-142-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/2092-141-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/3260-130-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/3260-134-0x000001352C1B0000-0x000001352C1B7000-memory.dmpFilesize
28KB
-
memory/4488-165-0x0000000000000000-mapping.dmp
-
memory/4488-173-0x00000208F3BD0000-0x00000208F3BD7000-memory.dmpFilesize
28KB
-
memory/4536-164-0x000001B1089A0000-0x000001B1089A7000-memory.dmpFilesize
28KB
-
memory/4536-160-0x0000000140000000-0x000000014013D000-memory.dmpFilesize
1.2MB
-
memory/4536-156-0x0000000000000000-mapping.dmp