Analysis
-
max time kernel
95s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 17:19
Behavioral task
behavioral1
Sample
449d985b7f89d03584b4f3c64e070f97806f74102ff6d4ff344b9d5d1bcacbc0.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
449d985b7f89d03584b4f3c64e070f97806f74102ff6d4ff344b9d5d1bcacbc0.dll
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
449d985b7f89d03584b4f3c64e070f97806f74102ff6d4ff344b9d5d1bcacbc0.dll
-
Size
114KB
-
MD5
6db879cf2cb4dd5ee86646b614859aa7
-
SHA1
9c2f32292325661295aa531b18f0f8fd657aa909
-
SHA256
449d985b7f89d03584b4f3c64e070f97806f74102ff6d4ff344b9d5d1bcacbc0
-
SHA512
019754ed0be1da6a6283d106095d179f3e028e1e3bac7608cede453a12ddc70ffe87aa8b1c40c49635cc064931bdbb3bb7e7fd0f935620585a8be05c68b3f667
-
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KpiCbmN:Mpl2GkGMkSgb8Svlu5KpON
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{25m95cu9-hh9l-pbwx-naxs-ge3ft2dwj9k2} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{25m95cu9-hh9l-pbwx-naxs-ge3ft2dwj9k2}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{25m95cu9-hh9l-pbwx-naxs-ge3ft2dwj9k2}\stubpath rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1336 wrote to memory of 4644 1336 rundll32.exe 83 PID 1336 wrote to memory of 4644 1336 rundll32.exe 83 PID 1336 wrote to memory of 4644 1336 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\449d985b7f89d03584b4f3c64e070f97806f74102ff6d4ff344b9d5d1bcacbc0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\449d985b7f89d03584b4f3c64e070f97806f74102ff6d4ff344b9d5d1bcacbc0.dll,#12⤵
- Modifies Installed Components in the registry
PID:4644
-