Overview
overview
4Static
static
4iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.exe
windows7-x64
1iU�...��.exe
windows10-2004-x64
1iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.url
windows7-x64
1iU�...��.url
windows10-2004-x64
1iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.exe
windows7-x64
1iU�...��.exe
windows10-2004-x64
1iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.url
windows7-x64
1iU�...��.url
windows10-2004-x64
1iU�...��.pdf
windows7-x64
1iU�...��.pdf
windows10-2004-x64
1iU�...��.url
windows7-x64
1iU�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2022 10:13
Behavioral task
behavioral1
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.pdf
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win10v2004-20220901-en
General
-
Target
iUjs]pƹuΫ X-Mouse Button Control K��.dll
-
Size
301KB
-
MD5
6eeef71b3203e8815614c057fbd6da49
-
SHA1
0223be8f1f589cee5f44d98ea2581acd05ab2b1a
-
SHA256
de76e04597d2e937807ffd44f744d15733b85b6679a7d96d5d634c6386cfab71
-
SHA512
ea73294364fcac57137e9a8ee7e7fb9bd4f8995ad08525dafac343d70b9daf836a3af694cc7797e80a6fef6becd0c58529b1295aed8f46482c78a7d0220216be
-
SSDEEP
6144:CQBbhIMIfMttz0eNrSyGpomHvVgWAQGiUUYVurwgiCnPK+ETB59RB:CibhA+tz0eNrSyGpomHvqWZGsYVGZnPM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4484 rundll32.exe 4484 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
rundll32.exedescription pid process Token: SeIncreaseQuotaPrivilege 4484 rundll32.exe Token: SeSecurityPrivilege 4484 rundll32.exe Token: SeTakeOwnershipPrivilege 4484 rundll32.exe Token: SeLoadDriverPrivilege 4484 rundll32.exe Token: SeSystemProfilePrivilege 4484 rundll32.exe Token: SeSystemtimePrivilege 4484 rundll32.exe Token: SeProfSingleProcessPrivilege 4484 rundll32.exe Token: SeIncBasePriorityPrivilege 4484 rundll32.exe Token: SeCreatePagefilePrivilege 4484 rundll32.exe Token: SeBackupPrivilege 4484 rundll32.exe Token: SeRestorePrivilege 4484 rundll32.exe Token: SeShutdownPrivilege 4484 rundll32.exe Token: SeDebugPrivilege 4484 rundll32.exe Token: SeSystemEnvironmentPrivilege 4484 rundll32.exe Token: SeRemoteShutdownPrivilege 4484 rundll32.exe Token: SeUndockPrivilege 4484 rundll32.exe Token: SeManageVolumePrivilege 4484 rundll32.exe Token: 33 4484 rundll32.exe Token: 34 4484 rundll32.exe Token: 35 4484 rundll32.exe Token: 36 4484 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2076 wrote to memory of 4484 2076 rundll32.exe rundll32.exe PID 2076 wrote to memory of 4484 2076 rundll32.exe rundll32.exe PID 2076 wrote to memory of 4484 2076 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\iUjs]pƹuΫ X-Mouse Button Control K��.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\iUjs]pƹuΫ X-Mouse Button Control K��.dll",#12⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-