Analysis
-
max time kernel
107s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 23:12
Static task
static1
Behavioral task
behavioral1
Sample
ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe
Resource
win10v2004-20220812-en
General
-
Target
ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe
-
Size
3.3MB
-
MD5
912c57bbd7cf80a43c01cb79107f4c4c
-
SHA1
53f9c116cdbb73deadc13f73ed0cdda0022ee3e8
-
SHA256
ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c
-
SHA512
c7257ede8d748859b4d2ceed6da86de9089291a15648505dca6fe53c1afc368fd50820ab4402613edd3306c8d9cdfa3fcdead9bae22dd5c26d392295df100c2e
-
SSDEEP
49152:r41MW0CcP/6n0qHxnbM9B97O1N5Fm8JrdEZjmA5YT8dgXIEk2Guq21vwFaZEGbI:r41fv49D7y8kdkjmAi8dgYEk3K1b
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 5 IoCs
pid Process 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 4400 rundll32.exe 4336 rundll32.exe 4336 rundll32.exe 4336 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\SystemPromote\SystemPromote.dll ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe -
Modifies data under HKEY_USERS 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\2d71d5ab = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\8b9e4cbc = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\f2c53c49 = "UlAr/XJ/c//k////" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\340d3099 = "/P////%%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\00000000\493c7345 = 6900300031002b0030003600620030006f003000310044003000360049003000700078003000530030003600490030007000780031004f003000300025002500000070006c00310065003000360062003000690030003100540030003700380030006a0078003100420030003600450030006e0055003100680030003200490030006e006c0031002b00300037007800300000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\c6c5dd44 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\d94388d2 = "GlAk/X6/G/Ap/YV/UxAk/YZ/Gl////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\f0bf0bde = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\c24899a6 = "VP/g/CV/Vl/2/Cx////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\d1abcdb6 = "///%" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\00000000\3efeb33e = 00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\1520c6f1 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\7f69fa1f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\c99a5f5c = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\fe94ce1e = "V/////%%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\00000000 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\00000000\370856c7 = 00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\0e93c3f3 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\a2e3b941 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\1c311243 = "GlAk/X6/G/Ap/YV/UxAk/YZ/Gl////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\2e22d94e = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\65114b36 = "VP/l////" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\e8f9dcc7 = "UlAr/XJ/c//k////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\e46c271e = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\0c230bcb = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\37b7a6d8 = "UlAr/XJ/c//k////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\38583bc3 = "Ml/2/CF/M//g/CZ////%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\00000000\a47da861 = 6f00300031004f0030003700780030006d00300030004b003000320045003000610055003100650030003700300030006d00300031002b0030003600340030006d006c0031006500300036004900300061006c00310054003000370038003000700055003000540030003700740030006e006c003100440030003600490030006d00550031004f0030003600340030006e00300031005900300032004500300000006f00300031004f0030003700780030006d00300030004b003000320045003000610055003100650030003700300030006d003000310065003000370038003000700078003000530030003600450030006d006c00310042003000320045003000690078003100530030003600680030006e006c0031004e00300037007800300071007800310059003000360055003000610055003000250000006f00300031004f0030003700780030006d00300030004b00300032004500300061005500310057003000360074003000690030003100410030003700380030007000780031002b0030003200490030006e00550031004d00300036006d003000610055003100500030003600490030006f007800310053003000370062003000690030003100650030003600550030006e00300030005400300030002500250000006f00300031004f0030003700780030006d00300030004b0030003200450030006100550031005900300036006800300071006c0031004d0030003600340030006d006c0031004a0030003700620030007100780031004100300036007400300061006c00310054003000370038003000700055003000540030003700740030006e006c003100440030003600490030006d00550031004f0030003600340030006e00300031005900300032004500300000006f00300031004f0030003700780030006d00300030004b003000320045003000610055003100410030003600340030007100550031004f0030003600450030006d006c0031004a00300036006d0030006e00550031005400300036007800300061006c003100670030003600450030006e0078003000540030003700740030006e006c003100440030003600490030006d00550031004f0030003600340030006e00300031005900300032004500300000006f00300031004f0030003700780030006d00300030004b003000320045003000610055003100410030003600340030007100550031004f0030003600450030006d006c0031004a00300036006d0030006e00550031005400300036007800300061006c00310054003000370038003000700055003000540030003700740030006e006c003100440030003600490030006d00550031004f0030003600340030006e00300031005900300032004500300000006f00300031004f0030003700780030006d00300030004b003000320045003000610055003100570030003600450030006f0030003100530030003700620030006e0078003100440030003700780030006f00300031004e0030003600590030006a0078003000530030003600620030006e00550031005a003000320045003000690078003100530030003600680030006e006c0031004e00300037007800300071007800310059003000360055003000610055003000250000006f00300031004f0030003700780030006d00300030004b003000320045003000610055003100570030003600450030006f0030003100530030003700620030006e0078003100440030003700780030006f00300031004e0030003600590030006a0078003000530030003600450030006d006c00310042003000320045003000690078003100530030003600680030006e006c0031004e00300037007800300071007800310059003000360055003000610055003000250000006f00300031004f0030003700780030006d00300030004b0030003200450030006100550031005a0030003600340030006a00300031004400300036004f0030006900780031004e0030003700740030006f00550031004e0030003600590030006a0078003000530030003600620030006e00550031005a003000320045003000690078003100530030003600680030006e006c0031004e00300037007800300071007800310059003000360055003000610055003000250000006f00300031004f0030003700780030006d00300030004b0030003200450030006100550031005a0030003600340030006a00300031004400300036004f0030006900780031005a0030003600340030006e0030003100590030003200490030006e006c0031002b003000370078003000610055003100500030003600490030006f007800310053003000370062003000690030003100650030003600550030006e00300030005400300030002500250000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\060df2cd = "c/Au/XV/H/Ap/X2/GP/j/Xt/axAv/X6////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\0dc3ee96 = "/P////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\7367429f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\a1dcff5b = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\f6ad6fa6 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\f1f24e29 = "Vl/l/C/////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\72758a5d = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\a0743acc = "N/////%%" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\iiid = "1" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\48bd1aff = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\6185d035 = "Vx/2/Cx/V//l////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\414bc593 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\51d2f2ea = "JlA3/YV/c/Au/Xh/J/Af/X6/aPAk/YP/GP////%%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\27ddcf6f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\bbf88800 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\c5705860 = "Vx////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\3c09c42b = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_41218fb7\eae10f9d\587b5709 = "V/////%%" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 4336 rundll32.exe 4336 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4400 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 87 PID 1400 wrote to memory of 4400 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 87 PID 1400 wrote to memory of 4400 1400 ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe 87 PID 4800 wrote to memory of 4336 4800 rundll32.exe 92 PID 4800 wrote to memory of 4336 4800 rundll32.exe 92 PID 4800 wrote to memory of 4336 4800 rundll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe"C:\Users\Admin\AppData\Local\Temp\ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\SystemPromote\SystemPromote.dll",serv -install2⤵
- Loads dropped DLL
PID:4400
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\SystemPromote\SystemPromote.dll",serv1⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\SystemPromote\SystemPromote.dll",serv2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ec9d64a2afe4f415bdb9d001e636cfba
SHA13e82a6ca858ec8d538865ccc7381df735274b257
SHA256941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543
SHA512ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e
-
Filesize
1.8MB
MD5ec9d64a2afe4f415bdb9d001e636cfba
SHA13e82a6ca858ec8d538865ccc7381df735274b257
SHA256941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543
SHA512ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e
-
Filesize
1.8MB
MD5ec9d64a2afe4f415bdb9d001e636cfba
SHA13e82a6ca858ec8d538865ccc7381df735274b257
SHA256941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543
SHA512ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e
-
Filesize
1.8MB
MD5ec9d64a2afe4f415bdb9d001e636cfba
SHA13e82a6ca858ec8d538865ccc7381df735274b257
SHA256941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543
SHA512ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e
-
Filesize
1.8MB
MD5ec9d64a2afe4f415bdb9d001e636cfba
SHA13e82a6ca858ec8d538865ccc7381df735274b257
SHA256941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543
SHA512ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e
-
Filesize
1.8MB
MD5ec9d64a2afe4f415bdb9d001e636cfba
SHA13e82a6ca858ec8d538865ccc7381df735274b257
SHA256941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543
SHA512ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e