Analysis
-
max time kernel
182s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe
Resource
win10v2004-20221111-en
General
-
Target
0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe
-
Size
58KB
-
MD5
50ec5eea49f541419f96483de88f42cf
-
SHA1
2dc8e80e6193191112d01aa0978e40074451c666
-
SHA256
0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6
-
SHA512
b6e1af165e35b06fd832cd0e3615801a610d7f623625a6f1a2dcb67fdd3c27cd6fbf1d05a6f0b04a766b6f7bb3ea4c62234e351e38e921f0dbd60ad660f9dfe1
-
SSDEEP
1536:/M3Re3bDCJHrooFriiqUTtDEJCh9SlIIlvZaus:U36CdHsgtP9gPZ0
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 59 1520 rundll32.exe 67 1520 rundll32.exe 93 1520 rundll32.exe 109 1520 rundll32.exe 118 1520 rundll32.exe 121 1520 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1908 rundll32.exe 1520 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ifonubaraxonugi = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\detend.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
rundll32.exepid process 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exerundll32.exedescription pid process target process PID 4996 wrote to memory of 1908 4996 0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe rundll32.exe PID 4996 wrote to memory of 1908 4996 0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe rundll32.exe PID 4996 wrote to memory of 1908 4996 0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe rundll32.exe PID 1908 wrote to memory of 1520 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1520 1908 rundll32.exe rundll32.exe PID 1908 wrote to memory of 1520 1908 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe"C:\Users\Admin\AppData\Local\Temp\0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\detend.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\detend.dll",iep3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD573c261dc4181f3b7e34a6f46ef72364c
SHA1b0019a4f75aef86dd8b5bc8ddcedf5dbe16e6f59
SHA256acfa31be0b0cc2699e21f2148a5c753332c82a4f8d41078de0ba95d4a8a8ac3d
SHA512c50c8c5dc94d56dfc2ebc1d75746cc385a8ea56266267686cd699d7bd72e21b8ac31c7a661db12a59ed986884be4e221962f9b06a8a23da045c0fe1829514074
-
Filesize
58KB
MD573c261dc4181f3b7e34a6f46ef72364c
SHA1b0019a4f75aef86dd8b5bc8ddcedf5dbe16e6f59
SHA256acfa31be0b0cc2699e21f2148a5c753332c82a4f8d41078de0ba95d4a8a8ac3d
SHA512c50c8c5dc94d56dfc2ebc1d75746cc385a8ea56266267686cd699d7bd72e21b8ac31c7a661db12a59ed986884be4e221962f9b06a8a23da045c0fe1829514074
-
Filesize
58KB
MD573c261dc4181f3b7e34a6f46ef72364c
SHA1b0019a4f75aef86dd8b5bc8ddcedf5dbe16e6f59
SHA256acfa31be0b0cc2699e21f2148a5c753332c82a4f8d41078de0ba95d4a8a8ac3d
SHA512c50c8c5dc94d56dfc2ebc1d75746cc385a8ea56266267686cd699d7bd72e21b8ac31c7a661db12a59ed986884be4e221962f9b06a8a23da045c0fe1829514074