Analysis
-
max time kernel
50s -
max time network
102s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-11-2022 22:02
Static task
static1
Behavioral task
behavioral1
Sample
bd68a0a8bbfca976be058d9c40a982bace5b1e70348f1d893541ba92291883c0.dll
Resource
win10-20220812-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
bd68a0a8bbfca976be058d9c40a982bace5b1e70348f1d893541ba92291883c0.dll
-
Size
629KB
-
MD5
53476acafbf70965fb1e6b7fc0125529
-
SHA1
7c21f34c0fefad0c96d357f21eda509051422870
-
SHA256
bd68a0a8bbfca976be058d9c40a982bace5b1e70348f1d893541ba92291883c0
-
SHA512
995f79ab65471935054d430ddf67d2d150db5f021ebb08b9fa5641dc778fc3aa4071d141baf1a5ab06179316f82bd4be7f0a9248c81956151138ed96d624bd18
-
SSDEEP
12288:6tGis7p49VmD3OjG7QbBtL95WhNye5JHKVu6cig1Doa:6tGis1T3OjueLqhd5NKAD3
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JyfdUa.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\PUxVcSKNdfjlWWx\\JyfdUa.dll\"" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1788 regsvr32.exe 1788 regsvr32.exe 2104 regsvr32.exe 2104 regsvr32.exe 2104 regsvr32.exe 2104 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1788 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2104 1788 regsvr32.exe 66 PID 1788 wrote to memory of 2104 1788 regsvr32.exe 66
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bd68a0a8bbfca976be058d9c40a982bace5b1e70348f1d893541ba92291883c0.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\PUxVcSKNdfjlWWx\JyfdUa.dll"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2104
-