Analysis
-
max time kernel
152s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe
Resource
win10v2004-20220812-en
General
-
Target
5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe
-
Size
49KB
-
MD5
4b61a51d9571042e3e8cfa57b743c229
-
SHA1
6984796ffaa15674530efe7ead717dc863b9d730
-
SHA256
5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb
-
SHA512
93e0b86e94f7a70ff819406043ab12d32590b9543cd20fa496c39d2b645d56be233114eabe28e45cf51e4dc714f37951a3e9e3e566d8d874369a0f26d79a350e
-
SSDEEP
1536:13i4M66Y9HRjniSy02GGszSbwdUlYADFk:1i40QUS4GGiSkuXD2
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3472 rundll32.exe 4396 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fraribujidif = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\tagrfd.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
rundll32.exepid process 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exerundll32.exedescription pid process target process PID 4512 wrote to memory of 3472 4512 5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe rundll32.exe PID 4512 wrote to memory of 3472 4512 5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe rundll32.exe PID 4512 wrote to memory of 3472 4512 5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe rundll32.exe PID 3472 wrote to memory of 4396 3472 rundll32.exe rundll32.exe PID 3472 wrote to memory of 4396 3472 rundll32.exe rundll32.exe PID 3472 wrote to memory of 4396 3472 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe"C:\Users\Admin\AppData\Local\Temp\5090460b4a58b04ada259dda1a1ec6bf805536b3448e5bbc516da8869d0096bb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\tagrfd.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\tagrfd.dll",iep3⤵
- Loads dropped DLL
PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5b1109d447c1827e6e68ae1c9fcdd1c4f
SHA185a5f56674dc8126e765379e26618aaa005bafa4
SHA2566b4aeede67019622e3053088e250021352ed4e636237cc713bfbbb0458a104e6
SHA5122ddb112f47cbcd52eccdc99f6910ca6ea233d7ffbf3d572616c59bca8a8977dfbe2cfe4980a9ffb6029e696a47a596d717b589e8511a345f22b9ec16377a7bb6
-
Filesize
49KB
MD5b1109d447c1827e6e68ae1c9fcdd1c4f
SHA185a5f56674dc8126e765379e26618aaa005bafa4
SHA2566b4aeede67019622e3053088e250021352ed4e636237cc713bfbbb0458a104e6
SHA5122ddb112f47cbcd52eccdc99f6910ca6ea233d7ffbf3d572616c59bca8a8977dfbe2cfe4980a9ffb6029e696a47a596d717b589e8511a345f22b9ec16377a7bb6
-
Filesize
49KB
MD5b1109d447c1827e6e68ae1c9fcdd1c4f
SHA185a5f56674dc8126e765379e26618aaa005bafa4
SHA2566b4aeede67019622e3053088e250021352ed4e636237cc713bfbbb0458a104e6
SHA5122ddb112f47cbcd52eccdc99f6910ca6ea233d7ffbf3d572616c59bca8a8977dfbe2cfe4980a9ffb6029e696a47a596d717b589e8511a345f22b9ec16377a7bb6