Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe
Resource
win10v2004-20220812-en
General
-
Target
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe
-
Size
3.3MB
-
MD5
d452b23310b0c7c1d9fe5783236af02d
-
SHA1
d57be2bc6046bf0d35196d98739dd415bb6470d7
-
SHA256
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04
-
SHA512
26f0d73f3ec0b2348fbbba2d2b4f24495ebb3c2310db9647cf4413e8e74c6e0bfe97d8bda31c68e99d1ef18ed9133acc6cbc699cbdb1864a4d58b60d9f2e2bc4
-
SSDEEP
49152:WRp5MRKkk1xIkBm/7LmoAial+YQovsGOlMQX9q+VUTEaDNf00GoC06:WR5VoHmFial+cOlrxtaDNtG0
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 3 IoCs
Processes:
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exerundll32.exerundll32.exepid process 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe 1788 rundll32.exe 320 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
Processes:
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exedescription ioc process File created C:\Program Files (x86)\AppendEngine\AppendEngine.dll 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe -
Modifies data under HKEY_USERS 53 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\a1dcff5b = "V/////%%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\587b5709 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\a0743acc = "N/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\d1abcdb6 = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\d94388d2 = "GxAp/X2/FPAm/X6/FlAu/XD/ax/j/Xt/axAv/X6////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\e8f9dcc7 = "UlAr/XJ/c//k////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\f6ad6fa6 = "V/////%%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\bbf88800 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\f0bf0bde = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\fe94ce1e = "V/////%%" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\iiid = "1" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\65114b36 = "VP/l////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\2d71d5ab = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\51d2f2ea = "PPAl/Y//GPAj/XP/QPAj/Xb/HPAj/XJ////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\3c09c42b = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\1c311243 = "GxAp/X2/FPAm/X6/FlAu/XD/ax/j/Xt/axAv/X6////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\2e22d94e = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\37b7a6d8 = "UlAr/XJ/c//k////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\6185d035 = "Vx/2/Cx/V//l////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\e46c271e = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\00000000\3efeb33e = 00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\1520c6f1 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\27ddcf6f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\c5705860 = "Vx////%%" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\00000000\370856c7 = 00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\0c230bcb = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\72758a5d = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\c24899a6 = "VP/g/CV/Vl/2/Cx////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\c99a5f5c = "///%" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\00000000\493c7345 = 6d0030003100650030003700380030006d00550031002b0030003700380030006d00550031002b00300036003400300061006c0031004400300036004900300070006c00310054003000300025002500000070006c00310044003000360049003000710078003100590030003600450030007100550031002b0030003600340030006e006c003000530030003600620030006e00550031005a00300030002500250000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\060df2cd = "GlAu/YP/c/Au/YZ/GxAp/YZ/GP/j/Xt/axAv/X6////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\340d3099 = "/P////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\7367429f = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\00000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\0e93c3f3 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\8b9e4cbc = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\f2c53c49 = "UlAr/XJ/c//k////" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\a2e3b941 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\0dc3ee96 = "/P////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\38583bc3 = "Ml/2/CF/M//g/CZ////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\414bc593 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\f1f24e29 = "Vl/l/C/////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\48bd1aff = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\7f69fa1f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\eae10f9d\c6c5dd44 = "V/////%%" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_6e922691\00000000\a47da861 = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exepid process 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exerundll32.exedescription pid process target process PID 4732 wrote to memory of 1788 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe rundll32.exe PID 4732 wrote to memory of 1788 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe rundll32.exe PID 4732 wrote to memory of 1788 4732 80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe rundll32.exe PID 332 wrote to memory of 320 332 rundll32.exe rundll32.exe PID 332 wrote to memory of 320 332 rundll32.exe rundll32.exe PID 332 wrote to memory of 320 332 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe"C:\Users\Admin\AppData\Local\Temp\80d858400f80d34b16842599f65f7dcd3406cc3cc9c14116862d51971389fa04.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\AppendEngine\AppendEngine.dll",serv -install2⤵
- Loads dropped DLL
PID:1788
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\AppendEngine\AppendEngine.dll",serv1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\AppendEngine\AppendEngine.dll",serv2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5240fdf6e42d1a6ea46acc603fb314e23
SHA1aae20b7012bb1c66756eb371a821aafec6cb5f8f
SHA2564464d69d86eb74b858361f90913f79f849a886ed36eee82e506b30ccb31a147e
SHA5125b5d50fada6a5abaf27469492c8318a5cca499d4ce09e7eaaf00448876cabed9e743c375c5593db13f9acea19e3fca0f5b8bea28c5696ad13e6ad183daa4df11
-
Filesize
2.1MB
MD5240fdf6e42d1a6ea46acc603fb314e23
SHA1aae20b7012bb1c66756eb371a821aafec6cb5f8f
SHA2564464d69d86eb74b858361f90913f79f849a886ed36eee82e506b30ccb31a147e
SHA5125b5d50fada6a5abaf27469492c8318a5cca499d4ce09e7eaaf00448876cabed9e743c375c5593db13f9acea19e3fca0f5b8bea28c5696ad13e6ad183daa4df11
-
Filesize
2.1MB
MD5240fdf6e42d1a6ea46acc603fb314e23
SHA1aae20b7012bb1c66756eb371a821aafec6cb5f8f
SHA2564464d69d86eb74b858361f90913f79f849a886ed36eee82e506b30ccb31a147e
SHA5125b5d50fada6a5abaf27469492c8318a5cca499d4ce09e7eaaf00448876cabed9e743c375c5593db13f9acea19e3fca0f5b8bea28c5696ad13e6ad183daa4df11
-
Filesize
2.1MB
MD5240fdf6e42d1a6ea46acc603fb314e23
SHA1aae20b7012bb1c66756eb371a821aafec6cb5f8f
SHA2564464d69d86eb74b858361f90913f79f849a886ed36eee82e506b30ccb31a147e
SHA5125b5d50fada6a5abaf27469492c8318a5cca499d4ce09e7eaaf00448876cabed9e743c375c5593db13f9acea19e3fca0f5b8bea28c5696ad13e6ad183daa4df11