Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
bfe7a3d3d916adecd7f566353e38d7024742edc4743e2a3af5edc44636cd5387.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfe7a3d3d916adecd7f566353e38d7024742edc4743e2a3af5edc44636cd5387.dll
Resource
win10v2004-20220901-en
General
-
Target
bfe7a3d3d916adecd7f566353e38d7024742edc4743e2a3af5edc44636cd5387.dll
-
Size
741KB
-
MD5
34f9b98d34ad196f831cd63d5d122bf5
-
SHA1
e8d4e378b54664f77200a48ba5022600c3bc13a6
-
SHA256
bfe7a3d3d916adecd7f566353e38d7024742edc4743e2a3af5edc44636cd5387
-
SHA512
f01bcc4bc50c15307e58de5e12a79f015e1259575725d058bad5bd3d22073ca2cc646b5dfda8b86b3a32f6ef095fae91c1241c54abae70940c665e08d0566ac3
-
SSDEEP
3072:+ONuMKQg2WX6UoAAFmfiTx7MH6t5DlCQBl/j9ISdPAmLbONu:+OWWUoAYm6Tx72y5Bpj9jAYbO
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SENS\Parameters\ServiceDll = "C:\\PROGRA~3\\ebxarjniebx.dat" rundll32.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\PROGRA~3\ebxarjniebx.dat rundll32.exe File opened for modification C:\PROGRA~3\ebxarjniebx.dat rundll32.exe File created C:\PROGRA~3\xbeinjraxbe.dat rundll32.exe File opened for modification C:\PROGRA~3\xbeinjraxbe.dat rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{C916B019-77F5-41A6-8555-47E6AA9A013E}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{C916B019-77F5-41A6-8555-47E6AA9A013E}.crmlog dllhost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 rundll32.exe 624 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 624 rundll32.exe Token: SeDebugPrivilege 624 rundll32.exe Token: SeDebugPrivilege 624 rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2264 wrote to memory of 624 2264 rundll32.exe 83 PID 2264 wrote to memory of 624 2264 rundll32.exe 83 PID 2264 wrote to memory of 624 2264 rundll32.exe 83 PID 624 wrote to memory of 792 624 rundll32.exe 82 PID 624 wrote to memory of 1096 624 rundll32.exe 88 PID 624 wrote to memory of 1096 624 rundll32.exe 88 PID 624 wrote to memory of 1096 624 rundll32.exe 88 PID 1096 wrote to memory of 4992 1096 cmd.exe 90 PID 1096 wrote to memory of 4992 1096 cmd.exe 90 PID 1096 wrote to memory of 4992 1096 cmd.exe 90 PID 4992 wrote to memory of 908 4992 net.exe 91 PID 4992 wrote to memory of 908 4992 net.exe 91 PID 4992 wrote to memory of 908 4992 net.exe 91 PID 624 wrote to memory of 3824 624 rundll32.exe 93 PID 624 wrote to memory of 3824 624 rundll32.exe 93 PID 624 wrote to memory of 3824 624 rundll32.exe 93 PID 3824 wrote to memory of 4584 3824 cmd.exe 96 PID 3824 wrote to memory of 4584 3824 cmd.exe 96 PID 3824 wrote to memory of 4584 3824 cmd.exe 96 PID 4584 wrote to memory of 4632 4584 net.exe 97 PID 4584 wrote to memory of 4632 4584 net.exe 97 PID 4584 wrote to memory of 4632 4584 net.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe7a3d3d916adecd7f566353e38d7024742edc4743e2a3af5edc44636cd5387.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe7a3d3d916adecd7f566353e38d7024742edc4743e2a3af5edc44636cd5387.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net start COMSysApp3⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\net.exenet start COMSysApp4⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start COMSysApp5⤵PID:908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start SENS3⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\net.exenet start SENS4⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SENS5⤵PID:4632
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:792
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:2812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1324