Analysis
-
max time kernel
35s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 17:34
Behavioral task
behavioral1
Sample
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll
Resource
win10v2004-20220812-en
General
-
Target
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll
-
Size
40KB
-
MD5
26e48730429eca96ce1bfe31646e60a0
-
SHA1
4ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
-
SHA256
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
-
SHA512
838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
SSDEEP
768:UNiMUlGYU83FpeiFMogGgkwn9gsoJ7WXMG4b0Pg7x0yEnbcuyD7UE:U2lGMXFq3dn9g7FTwPgtOnouy8E
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000014151-59.dat acprotect behavioral1/files/0x0008000000014151-60.dat acprotect behavioral1/files/0x0008000000014151-61.dat acprotect behavioral1/files/0x0008000000014151-62.dat acprotect behavioral1/files/0x0008000000014151-63.dat acprotect -
resource yara_rule behavioral1/memory/2032-56-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral1/files/0x0008000000014151-59.dat upx behavioral1/files/0x0008000000014151-60.dat upx behavioral1/files/0x0008000000014151-61.dat upx behavioral1/files/0x0008000000014151-62.dat upx behavioral1/files/0x0008000000014151-63.dat upx behavioral1/memory/1736-64-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral1/memory/2032-65-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral1/memory/1736-66-0x0000000010000000-0x0000000010024000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\360Update = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\360data\\taxleor.dll\",_RunAs@16" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 1940 wrote to memory of 2032 1940 rundll32.exe 27 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28 PID 2032 wrote to memory of 1736 2032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\360data\taxleor.dll",_RunAs@163⤵
- Loads dropped DLL
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67