Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80.dll
Resource
win10v2004-20220812-en
General
-
Target
b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80.dll
-
Size
48KB
-
MD5
804a83f1b9f685382eab6b9dddb4d874
-
SHA1
10e645f1902e76e1e75f7db617af9db53a569111
-
SHA256
b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80
-
SHA512
c67da37953a432d33efb7366d0e6d7bfea97a4db29f19e7ced8f2ab9c5887d21676f0dfb1b31c884efe941812b5fa591ab7fdf90a6caaebc1cd09bca1ebd8508
-
SSDEEP
768:mhpisvuzgdwMG9hl7c1McuEcnf99AOkCgPJDetp38:mplSbm1arAOkCgevM
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 18 4692 rundll32.exe 35 4692 rundll32.exe 47 4692 rundll32.exe 49 4692 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4692 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\zihxrd.dll rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\zihxrd.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 376 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3776 wrote to memory of 2604 3776 rundll32.exe 81 PID 3776 wrote to memory of 2604 3776 rundll32.exe 81 PID 3776 wrote to memory of 2604 3776 rundll32.exe 81 PID 2604 wrote to memory of 376 2604 rundll32.exe 82 PID 2604 wrote to memory of 376 2604 rundll32.exe 82 PID 2604 wrote to memory of 376 2604 rundll32.exe 82 PID 2604 wrote to memory of 4692 2604 rundll32.exe 84 PID 2604 wrote to memory of 4692 2604 rundll32.exe 84 PID 2604 wrote to memory of 4692 2604 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80.dll,#12⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s "C:\Users\Admin\AppData\Local\Temp\zihxrdreg.reg"3⤵
- Runs .reg file with regedit
PID:376
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\Common Files\Microsoft Shared\zihxrd.dll",polmxhat3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5804a83f1b9f685382eab6b9dddb4d874
SHA110e645f1902e76e1e75f7db617af9db53a569111
SHA256b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80
SHA512c67da37953a432d33efb7366d0e6d7bfea97a4db29f19e7ced8f2ab9c5887d21676f0dfb1b31c884efe941812b5fa591ab7fdf90a6caaebc1cd09bca1ebd8508
-
Filesize
48KB
MD5804a83f1b9f685382eab6b9dddb4d874
SHA110e645f1902e76e1e75f7db617af9db53a569111
SHA256b5c2e7d2f510c09a593f6ca8a5c9c4bd46ffa3e7e82cf903f09be29f267abd80
SHA512c67da37953a432d33efb7366d0e6d7bfea97a4db29f19e7ced8f2ab9c5887d21676f0dfb1b31c884efe941812b5fa591ab7fdf90a6caaebc1cd09bca1ebd8508