Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0.dll
Resource
win10v2004-20220901-en
General
-
Target
462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0.dll
-
Size
184KB
-
MD5
6ded2764a5ec08b082fd5a9ad0566d8a
-
SHA1
fa86e9731db2979e9d8edfb8a00675b780193e25
-
SHA256
462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0
-
SHA512
67569c245f59923e016fa2f663ac71d58e77b5e9749f68f3d6b05596f30b9dac105c5d7cffe23d45776f55f8d3b79bac05e5c7500953238cbbd8703d487ac240
-
SSDEEP
3072:gOu9bIE1JFXr+BxK/+xltRQWJZ97XWfLztyxem8tPQ8M8WANSt6Q+pywpe79F37n:xE1nXMxK/ItRQu97Xeztyom8tPQ8M8Cm
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 57 5048 rundll32.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4436 netsh.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DNSR\Parameters\ServiceDll = "C:\\Windows\\system32\\ctfmon.dll" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lsass.dll rundll32.exe File created C:\Windows\SysWOW64\ctfmon.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\ctfmon.dll rundll32.exe File created C:\Windows\SysWOW64\lsass.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5048 rundll32.exe 5048 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5048 rundll32.exe Token: SeShutdownPrivilege 5048 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4048 wrote to memory of 428 4048 rundll32.exe 82 PID 4048 wrote to memory of 428 4048 rundll32.exe 82 PID 4048 wrote to memory of 428 4048 rundll32.exe 82 PID 428 wrote to memory of 5048 428 rundll32.exe 83 PID 428 wrote to memory of 5048 428 rundll32.exe 83 PID 428 wrote to memory of 5048 428 rundll32.exe 83 PID 5048 wrote to memory of 4436 5048 rundll32.exe 94 PID 5048 wrote to memory of 4436 5048 rundll32.exe 94 PID 5048 wrote to memory of 4436 5048 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\462610c0b4912a4382b3cdf16e161b4e107e1b1688f0ca9abdede16fcef620c0.dll,CTFInit3⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Core Networking - IPHTTPSSL (TCP-In)" service=* dir=in protocol=tcp localport=300-400 action=allow4⤵
- Modifies Windows Firewall
PID:4436
-
-
-