Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
53de53007ecd2497d183c9184d74fe1ac165d096ed8e83287ea1ec510fa43d1d.dll
Resource
win7-20220812-en
General
-
Target
53de53007ecd2497d183c9184d74fe1ac165d096ed8e83287ea1ec510fa43d1d.dll
-
Size
468KB
-
MD5
05f43c6ab4e70109bb0dc17b24273a40
-
SHA1
b59e21936afb470081009b4fa0b6a1b025c2153e
-
SHA256
53de53007ecd2497d183c9184d74fe1ac165d096ed8e83287ea1ec510fa43d1d
-
SHA512
eb04efb19ad14061f4f1d3f0e14aec3e029fc6c39b423b69b930bf79bb606bfee14d9d3e1d318fc5b7c749159fab19026e3c2fc3f5868e7e3762fb51f219f54b
-
SSDEEP
12288:LXClLduO3HyzesG5ybCsUa2J/iKtsazrml:LyPPSzesG59qK63
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List rundll32Srv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile rundll32Srv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications rundll32Srv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\rundll32Srv.exe = "C:\\Windows\\SysWOW64\\rundll32Srv.exe:*:enabled:@shell32.dll,-1" rundll32Srv.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 rundll32Srv.exe -
resource yara_rule behavioral2/files/0x0009000000022e54-134.dat upx behavioral2/memory/5084-136-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/files/0x0009000000022e54-137.dat upx behavioral2/memory/5084-139-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px6D07.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1508 5084 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 rundll32Srv.exe 5084 rundll32Srv.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe 5084 rundll32Srv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 rundll32Srv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 5012 5040 rundll32.exe 82 PID 5040 wrote to memory of 5012 5040 rundll32.exe 82 PID 5040 wrote to memory of 5012 5040 rundll32.exe 82 PID 5012 wrote to memory of 5084 5012 rundll32.exe 83 PID 5012 wrote to memory of 5084 5012 rundll32.exe 83 PID 5012 wrote to memory of 5084 5012 rundll32.exe 83 PID 5084 wrote to memory of 576 5084 rundll32Srv.exe 6 PID 5084 wrote to memory of 576 5084 rundll32Srv.exe 6 PID 5084 wrote to memory of 576 5084 rundll32Srv.exe 6 PID 5084 wrote to memory of 576 5084 rundll32Srv.exe 6 PID 5084 wrote to memory of 576 5084 rundll32Srv.exe 6 PID 5084 wrote to memory of 576 5084 rundll32Srv.exe 6 PID 5084 wrote to memory of 664 5084 rundll32Srv.exe 4 PID 5084 wrote to memory of 664 5084 rundll32Srv.exe 4 PID 5084 wrote to memory of 664 5084 rundll32Srv.exe 4 PID 5084 wrote to memory of 664 5084 rundll32Srv.exe 4 PID 5084 wrote to memory of 664 5084 rundll32Srv.exe 4 PID 5084 wrote to memory of 664 5084 rundll32Srv.exe 4 PID 5084 wrote to memory of 764 5084 rundll32Srv.exe 14 PID 5084 wrote to memory of 764 5084 rundll32Srv.exe 14 PID 5084 wrote to memory of 764 5084 rundll32Srv.exe 14 PID 5084 wrote to memory of 764 5084 rundll32Srv.exe 14 PID 5084 wrote to memory of 764 5084 rundll32Srv.exe 14 PID 5084 wrote to memory of 764 5084 rundll32Srv.exe 14 PID 5084 wrote to memory of 768 5084 rundll32Srv.exe 13 PID 5084 wrote to memory of 768 5084 rundll32Srv.exe 13 PID 5084 wrote to memory of 768 5084 rundll32Srv.exe 13 PID 5084 wrote to memory of 768 5084 rundll32Srv.exe 13 PID 5084 wrote to memory of 768 5084 rundll32Srv.exe 13 PID 5084 wrote to memory of 768 5084 rundll32Srv.exe 13 PID 5084 wrote to memory of 780 5084 rundll32Srv.exe 12 PID 5084 wrote to memory of 780 5084 rundll32Srv.exe 12 PID 5084 wrote to memory of 780 5084 rundll32Srv.exe 12 PID 5084 wrote to memory of 780 5084 rundll32Srv.exe 12 PID 5084 wrote to memory of 780 5084 rundll32Srv.exe 12 PID 5084 wrote to memory of 780 5084 rundll32Srv.exe 12 PID 5084 wrote to memory of 880 5084 rundll32Srv.exe 11 PID 5084 wrote to memory of 880 5084 rundll32Srv.exe 11 PID 5084 wrote to memory of 880 5084 rundll32Srv.exe 11 PID 5084 wrote to memory of 880 5084 rundll32Srv.exe 11 PID 5084 wrote to memory of 880 5084 rundll32Srv.exe 11 PID 5084 wrote to memory of 880 5084 rundll32Srv.exe 11 PID 5084 wrote to memory of 932 5084 rundll32Srv.exe 10 PID 5084 wrote to memory of 932 5084 rundll32Srv.exe 10 PID 5084 wrote to memory of 932 5084 rundll32Srv.exe 10 PID 5084 wrote to memory of 932 5084 rundll32Srv.exe 10 PID 5084 wrote to memory of 932 5084 rundll32Srv.exe 10 PID 5084 wrote to memory of 932 5084 rundll32Srv.exe 10 PID 5084 wrote to memory of 1012 5084 rundll32Srv.exe 9 PID 5084 wrote to memory of 1012 5084 rundll32Srv.exe 9 PID 5084 wrote to memory of 1012 5084 rundll32Srv.exe 9 PID 5084 wrote to memory of 1012 5084 rundll32Srv.exe 9 PID 5084 wrote to memory of 1012 5084 rundll32Srv.exe 9 PID 5084 wrote to memory of 1012 5084 rundll32Srv.exe 9 PID 5084 wrote to memory of 440 5084 rundll32Srv.exe 8 PID 5084 wrote to memory of 440 5084 rundll32Srv.exe 8 PID 5084 wrote to memory of 440 5084 rundll32Srv.exe 8 PID 5084 wrote to memory of 440 5084 rundll32Srv.exe 8 PID 5084 wrote to memory of 440 5084 rundll32Srv.exe 8 PID 5084 wrote to memory of 440 5084 rundll32Srv.exe 8 PID 5084 wrote to memory of 688 5084 rundll32Srv.exe 81 PID 5084 wrote to memory of 688 5084 rundll32Srv.exe 81 PID 5084 wrote to memory of 688 5084 rundll32Srv.exe 81 PID 5084 wrote to memory of 688 5084 rundll32Srv.exe 81
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:576
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1012
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:780
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3428
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3368
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3276
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1596
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:1688
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1464
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:2864
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4748
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4412
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3652
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3528
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:3004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3360
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5084 -ip 50842⤵PID:1228
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3024
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:760
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53de53007ecd2497d183c9184d74fe1ac165d096ed8e83287ea1ec510fa43d1d.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53de53007ecd2497d183c9184d74fe1ac165d096ed8e83287ea1ec510fa43d1d.dll,#13⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 5765⤵
- Program crash
PID:1508
-
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2852
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2832
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2356
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2072
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1456
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1248
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD515e43cf7d67b779f26b0f7941dad5b93
SHA1b590d4bb8826335a20ccb02e45d407421a6de85f
SHA256382110f26a7a225baf2f1f67bcb470910170cdc511c56fdda368e376ea6782f8
SHA512ab54b18f732a9bd8e11c845c45b60fcdf8abacc8f4f4b50b4347b37405436732c49bec34409dbc1726cadf939e8ddd02bab1d5bb9ae1c43ac80eaa86d6f42da6
-
Filesize
84KB
MD515e43cf7d67b779f26b0f7941dad5b93
SHA1b590d4bb8826335a20ccb02e45d407421a6de85f
SHA256382110f26a7a225baf2f1f67bcb470910170cdc511c56fdda368e376ea6782f8
SHA512ab54b18f732a9bd8e11c845c45b60fcdf8abacc8f4f4b50b4347b37405436732c49bec34409dbc1726cadf939e8ddd02bab1d5bb9ae1c43ac80eaa86d6f42da6