Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 17:34
Behavioral task
behavioral1
Sample
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll
Resource
win10v2004-20220812-en
General
-
Target
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll
-
Size
40KB
-
MD5
26e48730429eca96ce1bfe31646e60a0
-
SHA1
4ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
-
SHA256
de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
-
SHA512
838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
SSDEEP
768:UNiMUlGYU83FpeiFMogGgkwn9gsoJ7WXMG4b0Pg7x0yEnbcuyD7UE:U2lGMXFq3dn9g7FTwPgtOnouy8E
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000022e3f-135.dat acprotect behavioral2/files/0x0008000000022e3f-136.dat acprotect -
resource yara_rule behavioral2/memory/4072-133-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral2/files/0x0008000000022e3f-135.dat upx behavioral2/files/0x0008000000022e3f-136.dat upx behavioral2/memory/2184-137-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral2/memory/2184-138-0x0000000010000000-0x0000000010024000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 2184 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\360Update = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\360data\\taxleor.dll\",_RunAs@16" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe 4072 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4072 1448 rundll32.exe 81 PID 1448 wrote to memory of 4072 1448 rundll32.exe 81 PID 1448 wrote to memory of 4072 1448 rundll32.exe 81 PID 4072 wrote to memory of 2184 4072 rundll32.exe 82 PID 4072 wrote to memory of 2184 4072 rundll32.exe 82 PID 4072 wrote to memory of 2184 4072 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\360data\taxleor.dll",_RunAs@163⤵
- Loads dropped DLL
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67
-
Filesize
40KB
MD526e48730429eca96ce1bfe31646e60a0
SHA14ebbe74998c3e316d5c39946ef9b690e3e3ec0b8
SHA256de9a5e300260b3bc5ebb435bf76ce9e2783266471f853c3e7cb3a8e3070a7e59
SHA512838cbc56325a6acc6138996f0bd34c97aa2ca3024578f115f370fc98221b3b4c27bac0a19b39fc63705cc5aa23147586bd04c16938c30ffb9ca6307d39b83b67