Analysis
-
max time kernel
154s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f.dll
Resource
win10v2004-20221111-en
General
-
Target
0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f.dll
-
Size
204KB
-
MD5
605b426d6ede5c6b8387c8b4daa0ad33
-
SHA1
c5a92a95351d0b84443fc72c22018dc52ba7fee8
-
SHA256
0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f
-
SHA512
eecae5d4f3cefc42192549be48f853033ac5449b0bc874c4202bda167e218e2ee811aa789ed1adb8d83bdc24a490b501d6d1e575f412b35d3aba347303d38f7b
-
SSDEEP
3072:GL++JmEBm6rnwbBNvhvC2izr39SEleieubVXiiXVxf8kBA7udepNmcp8Yaf8:s+ofnoNvBC1nJleifxX1XVbBCjNX83
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Yceyepemiyuvaca = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 224 rundll32.exe 224 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 224 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4640 wrote to memory of 224 4640 rundll32.exe rundll32.exe PID 4640 wrote to memory of 224 4640 rundll32.exe rundll32.exe PID 4640 wrote to memory of 224 4640 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f112a69ffd3348cf309ba6cf62762d03c5ba80eb0a9e528ea0d0fe53ffb038f.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:224