Analysis
-
max time kernel
161s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll
Resource
win10v2004-20220812-en
General
-
Target
eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll
-
Size
49KB
-
MD5
2be3b9fd175b797a02ac6001275ef217
-
SHA1
73a8da2dc793d1b05b0efc5661f1eb056ef52923
-
SHA256
eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200
-
SHA512
b07c4dd20f639ac43e05a2c036007c618763263318c7a17c341c0dea65c98e04fcf00f58bdcb699483bb889a0a6fe534c5e9af2eb22fa7ff014f755c04df8cb1
-
SSDEEP
1536:9hkZY/JXqY9T4vq8YJtWb+EkPK9Pt0iRLyyueavitoZoqHoVnSo8U+cPo1touoDk:EK/JXqY9T4vq8YJtWb+EkPK9Pt0iRLyb
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\wininet.dll = "regperf.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3588 rundll32.exe 3588 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 3588 1972 rundll32.exe 80 PID 1972 wrote to memory of 3588 1972 rundll32.exe 80 PID 1972 wrote to memory of 3588 1972 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eae35f96f879eba72b7aab1c42fb571933ba8f150cfb8645ab9ab7303c589200.dll,#12⤵
- Adds policy Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3588
-