Analysis

  • max time kernel
    209s
  • max time network
    176s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-09-2022 02:54

General

  • Target

    kernel64.sys.dll

  • Size

    3.7MB

  • MD5

    f9692149cbb3849d6cfcd21e7867f06d

  • SHA1

    0d7a03723e63fade925228bc39d40ed3861b0387

  • SHA256

    540572eeb170ec412d3f05cb567e7003c56a8af80e2053f20114c702fd8aaa49

  • SHA512

    fcf843cd22ffa661978ee6f4bae01fe78971d77db94a444540215ea599cdb4aa05461909031570524de12b0bc2e9e80bb1fef7dbce7b5243e7a68e8a79e0d1c9

  • SSDEEP

    98304:xhT4PdX6GyCsnv1Z7atMC5z/auwzLPwtv7UiJToNn:xGPdX6LCMatMQz//w3wtzU

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\kernel64.sys.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:344
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\kernel64.sys.dll,#1
      2⤵
        PID:1908
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4620.0.2018624100\999352566" -parentBuildID 20200403170909 -prefsHandle 1548 -prefMapHandle 1540 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4620 "\\.\pipe\gecko-crash-server-pipe.4620" 1628 gpu
          3⤵
            PID:4132
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4620.3.1097842730\1842810521" -childID 1 -isForBrowser -prefsHandle 2244 -prefMapHandle 1300 -prefsLen 122 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4620 "\\.\pipe\gecko-crash-server-pipe.4620" 2212 tab
            3⤵
              PID:4728
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4620.13.1674171313\1056196675" -childID 2 -isForBrowser -prefsHandle 3372 -prefMapHandle 3368 -prefsLen 6904 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4620 "\\.\pipe\gecko-crash-server-pipe.4620" 3352 tab
              3⤵
                PID:4368
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x420
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:208
          • C:\Windows\system32\notepad.exe
            "C:\Windows\system32\notepad.exe"
            1⤵
              PID:2420
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /4
              1⤵
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:672

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1908-120-0x0000000000000000-mapping.dmp

            • memory/1908-121-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-122-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-123-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-124-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-125-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-126-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-127-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-128-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-129-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-130-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-132-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-133-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-134-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-135-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-136-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-137-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-138-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-139-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-140-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-141-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-142-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-144-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-146-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-147-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-145-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-143-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-131-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-148-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-149-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-150-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-151-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-152-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-153-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-154-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-155-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-156-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-157-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-158-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-159-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-160-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-161-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-162-0x00000000732F0000-0x000000007384C000-memory.dmp

              Filesize

              5.4MB

            • memory/1908-163-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-164-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-165-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-166-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB

            • memory/1908-167-0x0000000077170000-0x00000000772FE000-memory.dmp

              Filesize

              1.6MB