Analysis
-
max time kernel
201s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d.dll
Resource
win10v2004-20221111-en
General
-
Target
837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d.dll
-
Size
29KB
-
MD5
5aa9154323333d7856e4b9903b7c5e50
-
SHA1
ca9f9493aa3f245a5af2e3b951e3a07f944c50bf
-
SHA256
837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d
-
SHA512
e64803fcee0868e4e927b891a0ade00719520720e1831a05523836115983c4573f53ac4a12dd1250517d3399071d24429529e60f681716881ebd341a29207598
-
SSDEEP
768:7w8z/CdUZfPNzYedSCw3g4e7T1fyGj4wkPrl2KY:T7CdUZtEiL+gVj4PB1Y
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dmserveice\Parameters\ServiceDll = "C:\\Windows\\system32\\msflxgrd.ocx.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4556 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3416 wrote to memory of 4716 3416 rundll32.exe 80 PID 3416 wrote to memory of 4716 3416 rundll32.exe 80 PID 3416 wrote to memory of 4716 3416 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:4716
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:4556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD55aa9154323333d7856e4b9903b7c5e50
SHA1ca9f9493aa3f245a5af2e3b951e3a07f944c50bf
SHA256837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d
SHA512e64803fcee0868e4e927b891a0ade00719520720e1831a05523836115983c4573f53ac4a12dd1250517d3399071d24429529e60f681716881ebd341a29207598
-
Filesize
29KB
MD55aa9154323333d7856e4b9903b7c5e50
SHA1ca9f9493aa3f245a5af2e3b951e3a07f944c50bf
SHA256837035316f11f0769687ab0cf9a8eb2a87b8a8f93e70bd182762c2d63eb4a76d
SHA512e64803fcee0868e4e927b891a0ade00719520720e1831a05523836115983c4573f53ac4a12dd1250517d3399071d24429529e60f681716881ebd341a29207598