Analysis
-
max time kernel
70s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
31f507579d847e8bd08f86a4a35e9c2ee135f7a92ee5287d32160fa1764b22fe.dll
Resource
win10-20220812-en
5 signatures
150 seconds
General
-
Target
31f507579d847e8bd08f86a4a35e9c2ee135f7a92ee5287d32160fa1764b22fe.dll
-
Size
660KB
-
MD5
f6252869d8e90923707f1c678f4ad11d
-
SHA1
659d5fd8d29cd8530ac723022f78ef85392f057f
-
SHA256
31f507579d847e8bd08f86a4a35e9c2ee135f7a92ee5287d32160fa1764b22fe
-
SHA512
4f0737768eee3cfa5f8f2e767810365e3353ca997a6ad00f4df7af84f8dd83eae46d964ee16af880e115b6e65f2452558d2a94e7a9ef772309a2df108ae64220
-
SSDEEP
12288:H6NFi+qz19gtAgY2tiZl4c/aukg78I8v4lSRi4gu2CTRD:aNY19gigZtiZyvukmQAlQEG
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\enfqzh.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GRKoxXCnHFA\\enfqzh.dll\"" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2976 regsvr32.exe 2976 regsvr32.exe 2132 regsvr32.exe 2132 regsvr32.exe 2132 regsvr32.exe 2132 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2976 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2132 2976 regsvr32.exe 66 PID 2976 wrote to memory of 2132 2976 regsvr32.exe 66
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\31f507579d847e8bd08f86a4a35e9c2ee135f7a92ee5287d32160fa1764b22fe.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GRKoxXCnHFA\enfqzh.dll"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2132
-