Analysis
-
max time kernel
165s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe
Resource
win10v2004-20221111-en
General
-
Target
ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe
-
Size
79KB
-
MD5
32c2e619a7600227ceab5048118d51c2
-
SHA1
5c4c76855f9c8eda78a6e0009ee090f94d7721ac
-
SHA256
ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79
-
SHA512
76c1a7e852ac0bfa24c7c03cb29ecb546856cb2687b0584fda925344761e03d8d50110dfaecfa19848cf01f886b5cafa062eff615bb4ec584c0e2d541bf4e87a
-
SSDEEP
1536:DOC8kXwuCz+3gSKkygWB5BsbH7nPLn0mp57ruxcYQmoMTCH:D78/u1QNkygegbHbPLXp5+xcYQ/MWH
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
Processes:
rundll32.exerundll32.exepid process 1364 rundll32.exe 1364 rundll32.exe 1364 rundll32.exe 1364 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fyaloducexuc = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\utic1026.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exepid process 1364 rundll32.exe 1364 rundll32.exe 1364 rundll32.exe 1364 rundll32.exe 1364 rundll32.exe 1364 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exerundll32.exedescription pid process target process PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1520 wrote to memory of 1364 1520 ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe PID 1364 wrote to memory of 1644 1364 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe"C:\Users\Admin\AppData\Local\Temp\ef874fec785e4327acf288f10d836c60efb0cdaa553b16d4991118778ccc2f79.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\utic1026.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\utic1026.dll",iep3⤵
- Loads dropped DLL
PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529
-
Filesize
79KB
MD5ae05b964a6fb73ea395bcd935efb6463
SHA14d1577ef4232a8898c33bdcc16e3d4ff13656563
SHA256c9a161c6ce536c69acc26021547eb3a630063b9159c988eee5ac530342c577fa
SHA5121fbef436abdcaf73dbd5343b59d29eb17dc5b219d58165bcd936a74efa0022b9eab0aa8681f6dbef6f4cee2012466961a6a633080c27a5124de5f5c618655529