Analysis
-
max time kernel
154s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
ef24f39a146f193ca4cf6c2e62ca0a42a28f2f87585f38f904070b69418a0f0a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef24f39a146f193ca4cf6c2e62ca0a42a28f2f87585f38f904070b69418a0f0a.dll
Resource
win10v2004-20221111-en
General
-
Target
ef24f39a146f193ca4cf6c2e62ca0a42a28f2f87585f38f904070b69418a0f0a.dll
-
Size
160KB
-
MD5
21c1a214c5b419b0be4d436ee9018050
-
SHA1
75932768e31f7dff7447cbd0301222065cb18590
-
SHA256
ef24f39a146f193ca4cf6c2e62ca0a42a28f2f87585f38f904070b69418a0f0a
-
SHA512
575b5bea1f5918f2fb13f89038c20c6493e7f3bcba7ab3c1a207f89f843ddbb8be7465a9e1305aeb02df756a3c83ded4382eb087f0cc59ee0a4faa2fb1454d5a
-
SSDEEP
3072:zUtENadzm8QRVtfj42ZZHwiIjYMytMpDv/4cNB/ni4R4PG6HzK/4LfGKmjTj6Qcp:zUtENadztQRVtr/QTYMy69TPi4WO6HzE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",rundll32.exe C:\\Windows\\system32\\070413.dll start" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mywinsys.ini rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1244 4708 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4708 rundll32.exe 4708 rundll32.exe 4708 rundll32.exe 4708 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4708 rundll32.exe Token: SeDebugPrivilege 4708 rundll32.exe Token: SeDebugPrivilege 4708 rundll32.exe Token: SeDebugPrivilege 4708 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4708 4984 rundll32.exe 82 PID 4984 wrote to memory of 4708 4984 rundll32.exe 82 PID 4984 wrote to memory of 4708 4984 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef24f39a146f193ca4cf6c2e62ca0a42a28f2f87585f38f904070b69418a0f0a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef24f39a146f193ca4cf6c2e62ca0a42a28f2f87585f38f904070b69418a0f0a.dll,#12⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 8963⤵
- Program crash
PID:1244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4708 -ip 47081⤵PID:3240