Analysis
-
max time kernel
145s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 04:36
Behavioral task
behavioral1
Sample
f26721e0e70940d5f3fb40ce118db73ef02c5466d90084547afd7699952503e5.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f26721e0e70940d5f3fb40ce118db73ef02c5466d90084547afd7699952503e5.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
f26721e0e70940d5f3fb40ce118db73ef02c5466d90084547afd7699952503e5.dll
-
Size
114KB
-
MD5
6f8676c5399314410456b91922c62246
-
SHA1
20b380a72ada687c82ce18d155ef60dd42c8517b
-
SHA256
f26721e0e70940d5f3fb40ce118db73ef02c5466d90084547afd7699952503e5
-
SHA512
9c1c0315482ebc0d117cdd12f5659c11853c40e7d6d11e7194fc91f516edfc08390d6797613695c6d389f9fa8ef5f0afb1cc31aa925c54a33e220c8d70a6a2bd
-
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KjiCbmN:Mpl2GkGMkSgb8Svlu5KjON
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{hfojglyl-cpwc-kgau-adhx-nyqfxoiriaph} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{hfojglyl-cpwc-kgau-adhx-nyqfxoiriaph}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{hfojglyl-cpwc-kgau-adhx-nyqfxoiriaph}\stubpath rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 396 4552 rundll32.exe 83 PID 4552 wrote to memory of 396 4552 rundll32.exe 83 PID 4552 wrote to memory of 396 4552 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f26721e0e70940d5f3fb40ce118db73ef02c5466d90084547afd7699952503e5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f26721e0e70940d5f3fb40ce118db73ef02c5466d90084547afd7699952503e5.dll,#12⤵
- Modifies Installed Components in the registry
PID:396
-