Analysis
-
max time kernel
33s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 12:53
Static task
static1
Behavioral task
behavioral1
Sample
8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe
Resource
win10v2004-20220812-en
General
-
Target
8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe
-
Size
8KB
-
MD5
6f03c754931a34e29429bee1050cf1a0
-
SHA1
25552629c0a0b44988cd535587038798bd989511
-
SHA256
8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990
-
SHA512
c2d7b1a522710757abb069139411cffafd4ba4cdd562eedc644b447aab8dd82c8fc392a73fcd3ad2e62cf1b4e1e34a5a02f1f28c3f4f1a1291fd3ad7f320aa47
-
SSDEEP
96:D8EqkMWlhadkeA8OAZGU7sLo+xyT0WErn8HcL4iSAZVA8tkgmWxSeFHYLP5CY5oa:eWTHebOAUBxY0WLs4sZVV56LwOj8Y
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuditxwb\ImagePath = "\\??\\C:\\Windows\\Fonts\\wuditxwb.fon" rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\wuditxwb.fon rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1668 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1876 1960 8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe 28 PID 1960 wrote to memory of 1876 1960 8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe 28 PID 1960 wrote to memory of 1876 1960 8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe 28 PID 1960 wrote to memory of 1876 1960 8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe 28 PID 1876 wrote to memory of 1668 1876 cmd.exe 30 PID 1876 wrote to memory of 1668 1876 cmd.exe 30 PID 1876 wrote to memory of 1668 1876 cmd.exe 30 PID 1876 wrote to memory of 1668 1876 cmd.exe 30 PID 1876 wrote to memory of 1668 1876 cmd.exe 30 PID 1876 wrote to memory of 1668 1876 cmd.exe 30 PID 1876 wrote to memory of 1668 1876 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe"C:\Users\Admin\AppData\Local\Temp\8dfe65f00d67f6568faa438adfe903a8be82b4a3992a0cf7d7e07a2502047990.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c rundll32 Runt.dll,RundllTest2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32 Runt.dll,RundllTest3⤵
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD58ce6c6f454393ea89e39cab77fe3fe01
SHA107d8e6cd407620624b62a7b5bca16950b855f4b7
SHA256ccbf96e37a5736dd48ce093681425410259725c9c9619b5efc8571093aa3bedb
SHA512ab1a92dbd81dcdea142d0d2e3a4fef7f17aa760ad32edc3a823918e13d29b079dd5eca45f63001f2ec1427d9358bae2884a94004539ce42da69bebc252d00caa
-
Filesize
7KB
MD58ce6c6f454393ea89e39cab77fe3fe01
SHA107d8e6cd407620624b62a7b5bca16950b855f4b7
SHA256ccbf96e37a5736dd48ce093681425410259725c9c9619b5efc8571093aa3bedb
SHA512ab1a92dbd81dcdea142d0d2e3a4fef7f17aa760ad32edc3a823918e13d29b079dd5eca45f63001f2ec1427d9358bae2884a94004539ce42da69bebc252d00caa
-
Filesize
7KB
MD58ce6c6f454393ea89e39cab77fe3fe01
SHA107d8e6cd407620624b62a7b5bca16950b855f4b7
SHA256ccbf96e37a5736dd48ce093681425410259725c9c9619b5efc8571093aa3bedb
SHA512ab1a92dbd81dcdea142d0d2e3a4fef7f17aa760ad32edc3a823918e13d29b079dd5eca45f63001f2ec1427d9358bae2884a94004539ce42da69bebc252d00caa
-
Filesize
7KB
MD58ce6c6f454393ea89e39cab77fe3fe01
SHA107d8e6cd407620624b62a7b5bca16950b855f4b7
SHA256ccbf96e37a5736dd48ce093681425410259725c9c9619b5efc8571093aa3bedb
SHA512ab1a92dbd81dcdea142d0d2e3a4fef7f17aa760ad32edc3a823918e13d29b079dd5eca45f63001f2ec1427d9358bae2884a94004539ce42da69bebc252d00caa
-
Filesize
7KB
MD58ce6c6f454393ea89e39cab77fe3fe01
SHA107d8e6cd407620624b62a7b5bca16950b855f4b7
SHA256ccbf96e37a5736dd48ce093681425410259725c9c9619b5efc8571093aa3bedb
SHA512ab1a92dbd81dcdea142d0d2e3a4fef7f17aa760ad32edc3a823918e13d29b079dd5eca45f63001f2ec1427d9358bae2884a94004539ce42da69bebc252d00caa