Analysis
-
max time kernel
162s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:52
Static task
static1
Behavioral task
behavioral1
Sample
19a67fd12fd64cbf9811147ef0b993d7a2acad994a26863d4126e85c4cf22fd0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19a67fd12fd64cbf9811147ef0b993d7a2acad994a26863d4126e85c4cf22fd0.dll
Resource
win10v2004-20220812-en
General
-
Target
19a67fd12fd64cbf9811147ef0b993d7a2acad994a26863d4126e85c4cf22fd0.dll
-
Size
49KB
-
MD5
eafcce13121f24e6e9f0e397299b1b64
-
SHA1
f1f8a7f1c00685a705dafefa6c61718272b9cf86
-
SHA256
19a67fd12fd64cbf9811147ef0b993d7a2acad994a26863d4126e85c4cf22fd0
-
SHA512
f8e9af1d63fc5b2c7a7d785d385402dfa534905dbd0fc14230dd295d94fb44ff464f26f24b151166d8014ff89f559aecba6088c22cb6d30b5b6cb4a916471819
-
SSDEEP
1536:rUqhmQry2xUOXnNOq92na9McFsvh2zKkC3zoSeVC:Zmo+On9jiYOkC30SeVC
Malware Config
Signatures
-
Modifies WinLogon 2 TTPs 8 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\DllName = "mdhcp32.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Startup = "WinStart2EX" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Logoff = "WinOff2EX" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Shutdown = "WinOff2EX" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Asynchronous = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Impersonate = "0" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5036 wrote to memory of 1200 5036 rundll32.exe rundll32.exe PID 5036 wrote to memory of 1200 5036 rundll32.exe rundll32.exe PID 5036 wrote to memory of 1200 5036 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19a67fd12fd64cbf9811147ef0b993d7a2acad994a26863d4126e85c4cf22fd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19a67fd12fd64cbf9811147ef0b993d7a2acad994a26863d4126e85c4cf22fd0.dll,#12⤵
- Modifies WinLogon
PID:1200