Analysis
-
max time kernel
38s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
2e733b1d973297b0ab7b533362024c4e0213f6336c5e1b9aa7a36d979063ea1d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e733b1d973297b0ab7b533362024c4e0213f6336c5e1b9aa7a36d979063ea1d.dll
Resource
win10v2004-20220812-en
General
-
Target
2e733b1d973297b0ab7b533362024c4e0213f6336c5e1b9aa7a36d979063ea1d.dll
-
Size
87KB
-
MD5
56dc8d2511267ea7c38ac564973d8e90
-
SHA1
1587c6e7cfbbbdd70076defccbba9b910c673b00
-
SHA256
2e733b1d973297b0ab7b533362024c4e0213f6336c5e1b9aa7a36d979063ea1d
-
SHA512
ed0e7fed2767239f3e88fab73ed3b34f67fcb1114872ab6f1743f9a9c9f1441bff9a660bd2ddcc2703caae72e2c5ccf1941516acd556e3937a40013602471b13
-
SSDEEP
768:IhCzF5unaFeIJCsoNv3KePEv3HmfcpgKFuqd0nn/ICUS4pCypfoeAjPlAHZ9D7dR:IhCZFcsifjE0SJIB/6pCypfoe6WH/vx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IAMAPP = "C:\\Windows\\DjsyLu.exe" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\DjsyLu.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 rundll32.exe 1940 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1940 1676 rundll32.exe 28 PID 1676 wrote to memory of 1940 1676 rundll32.exe 28 PID 1676 wrote to memory of 1940 1676 rundll32.exe 28 PID 1676 wrote to memory of 1940 1676 rundll32.exe 28 PID 1676 wrote to memory of 1940 1676 rundll32.exe 28 PID 1676 wrote to memory of 1940 1676 rundll32.exe 28 PID 1676 wrote to memory of 1940 1676 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e733b1d973297b0ab7b533362024c4e0213f6336c5e1b9aa7a36d979063ea1d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e733b1d973297b0ab7b533362024c4e0213f6336c5e1b9aa7a36d979063ea1d.dll,#12⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1940
-