Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe
Resource
win10v2004-20220812-en
General
-
Target
6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe
-
Size
88KB
-
MD5
69b3836af8283efae2c26218e05451fb
-
SHA1
20aec039d5c587105a45d1b6963cbe680becc9fe
-
SHA256
6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337
-
SHA512
eae01a8424c61b5b920cee63cae625e41a1365767c7dd27fb2a0be378f3618ba69f54af43bbadf8d1cf98eea617a4bd114743d295633b413ec3f7fef1b1250f9
-
SSDEEP
1536:CH1JTTU8QY1JpqhDcEfJEXuXS/ZMd0s63eC7wLf79ymBtUj/z/+QoeulWXW3IRXM:CvTTzQ1hDcExEiS/Za05Xc9yjjL/kN+y
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 25 4328 rundll32.exe 28 4328 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4816 rundll32.exe 4328 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Udasagoxutuxunak = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Wilcolg.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe 4816 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4816 2412 6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe 81 PID 2412 wrote to memory of 4816 2412 6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe 81 PID 2412 wrote to memory of 4816 2412 6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe 81 PID 4816 wrote to memory of 4328 4816 rundll32.exe 83 PID 4816 wrote to memory of 4328 4816 rundll32.exe 83 PID 4816 wrote to memory of 4328 4816 rundll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe"C:\Users\Admin\AppData\Local\Temp\6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wilcolg.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wilcolg.dll",iep3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD59efbddadd7ebb08e568a60aa6dc410df
SHA1a17a9d88d48785fd6dedd895a0a845dec5b00560
SHA256d08575eefd9ed06b4244f5e1b0e0b9fed300178ad32b0893121cdf89d9e9e3d1
SHA512851ea28b0228695bf56193b3ba7274c7ceaf459c5b107f3529fea4e8c1e953772115925709e740d686d579c72e472ce677a81aba4a6bca70eb61162a339a0f95
-
Filesize
88KB
MD59efbddadd7ebb08e568a60aa6dc410df
SHA1a17a9d88d48785fd6dedd895a0a845dec5b00560
SHA256d08575eefd9ed06b4244f5e1b0e0b9fed300178ad32b0893121cdf89d9e9e3d1
SHA512851ea28b0228695bf56193b3ba7274c7ceaf459c5b107f3529fea4e8c1e953772115925709e740d686d579c72e472ce677a81aba4a6bca70eb61162a339a0f95
-
Filesize
88KB
MD59efbddadd7ebb08e568a60aa6dc410df
SHA1a17a9d88d48785fd6dedd895a0a845dec5b00560
SHA256d08575eefd9ed06b4244f5e1b0e0b9fed300178ad32b0893121cdf89d9e9e3d1
SHA512851ea28b0228695bf56193b3ba7274c7ceaf459c5b107f3529fea4e8c1e953772115925709e740d686d579c72e472ce677a81aba4a6bca70eb61162a339a0f95