Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll
Resource
win10v2004-20220812-en
General
-
Target
cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll
-
Size
56KB
-
MD5
4c3df960a3fc6954c500bc78a8e7f954
-
SHA1
4edf829086d0e72750641d251e5926efb12f6aee
-
SHA256
cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06
-
SHA512
6d3b32febb8ae4ca2cf770d8c14e01223ee621391ce95f1267260c59312bd415723a739b4e06d282fc7a0635a46e93e07b27fec4a0b3c42e6f79e1968d1d64dd
-
SSDEEP
768:q0zhd9fKg9F+Sx7JLHuLp2Kj/O8N98mpnpdmFXKun+5b1Zjpb2cRaRKs9O0llxgj:vznVbHdJ0TbWNVOZNb2cRaRNU0Oj
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ibomamufoy = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
rundll32.exepid process 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 5100 wrote to memory of 812 5100 rundll32.exe rundll32.exe PID 5100 wrote to memory of 812 5100 rundll32.exe rundll32.exe PID 5100 wrote to memory of 812 5100 rundll32.exe rundll32.exe PID 812 wrote to memory of 4848 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 4848 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 4848 812 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\cc15e9ca0d5fc9effdec203aa8cca19fb78b55613f91a22518e4c121899d3e06.dll",iep3⤵PID:4848