Analysis
-
max time kernel
169s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe
Resource
win10v2004-20220812-en
General
-
Target
0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe
-
Size
2.8MB
-
MD5
4f223593516f4b0774c5dfa3d459d6ff
-
SHA1
0b1579bf0cf9a422148a2e5900cc1f0d67ec16fb
-
SHA256
0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb
-
SHA512
358368fe3b81e316f28a2b2a01e190aa08204192da22b2a0d73fe91fcbe5c3be3f8ce4b3f6722fd3a396ac9dcbb2318a4d4a65f27e2f508937883e2af897461d
-
SSDEEP
49152:Tsn+sPhIxWg2MQjdAYUU8V6zlBsjmb00HT0S+OqmewHuK/W7d:Ts+d4ZuYUUY6SZ0H4fOft/
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 5 IoCs
pid Process 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 4232 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\RelayDefender\RelayDefender.dll 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe -
Modifies data under HKEY_USERS 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\38583bc3 = "Ml/2/CF/M//g/CZ////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\a2e3b941 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\e8f9dcc7 = "UlAr/XJ/c//k////" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\00000000 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\00000000\370856c7 = 00000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\7367429f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\a0743acc = "N/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\c99a5f5c = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\51d2f2ea = "JxAu/Xl/FPA3/DP/GPAv/XJ/axAt/XJ/bx////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\bbf88800 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\d1abcdb6 = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\0dc3ee96 = "/P////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\37b7a6d8 = "UlAr/XJ/c//k////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\6185d035 = "Vx/2/Cx/V//l////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\8b9e4cbc = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\c5705860 = "Vx////%%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\7f69fa1f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\1520c6f1 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\340d3099 = "/P////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\f0bf0bde = "///%" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\00000000\3efeb33e = 00000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\f2c53c49 = "UlAr/XJ/c//k////" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\0e93c3f3 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\2e22d94e = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\c6c5dd44 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\fe94ce1e = "V/////%%" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\iiid = "1" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\d94388d2 = "GlAk/X6/G/Ap/YV/UxAk/YZ/Gl////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\e46c271e = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\65114b36 = "VP/l////" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\00000000\a47da861 = 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 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\2d71d5ab = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\f1f24e29 = "Vl/l/C/////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\060df2cd = "c/Au/XV/H/Ap/X2/GP/j/Xt/axAv/X6////%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\414bc593 = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\c24899a6 = "VP/g/CV/Vl/2/Cx////%" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\00000000\493c7345 = 6900300031002b0030003600620030006f003000310044003000360049003000700078003000530030003600490030007000780031004f003000300025002500000070006c00310065003000360062003000690030003100540030003700380030006a0078003100420030003600450030006e0055003100680030003200490030006e006c0031002b00300037007800300000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\48bd1aff = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\72758a5d = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\27ddcf6f = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\587b5709 = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\a1dcff5b = "V/////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\3c09c42b = "///%" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\0c230bcb = "///%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\1c311243 = "GlAk/X6/G/Ap/YV/UxAk/YZ/Gl////%%" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\_156c2b3d\eae10f9d\f6ad6fa6 = "V/////%%" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 2632 rundll32.exe 2632 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4232 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 84 PID 4628 wrote to memory of 4232 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 84 PID 4628 wrote to memory of 4232 4628 0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe 84 PID 332 wrote to memory of 2632 332 rundll32.exe 86 PID 332 wrote to memory of 2632 332 rundll32.exe 86 PID 332 wrote to memory of 2632 332 rundll32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe"C:\Users\Admin\AppData\Local\Temp\0d687b34f55d9fb09fa62118a7f26d11581bf16a10b74da35ecaf46c52332ffb.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\RelayDefender\RelayDefender.dll",serv -install2⤵
- Loads dropped DLL
PID:4232
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\RelayDefender\RelayDefender.dll",serv1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\RelayDefender\RelayDefender.dll",serv2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59c7ad6fbeecee71bc7d4d6cf23e288e8
SHA155b4e38630a8eb59d2605814362e36de63c556a5
SHA2560f6e8325030b23d6d61246808d83ba369b75de35069b060ce8a3a6ac71bb7af6
SHA512ac01f875edb5b716b248a7a99c4547dfe87cd05bae6f30622a1e5e6dff02aa13cf619463125ea970887569bcac49e1e36a61ef8aca730d3dd48462a6e9ac97f9
-
Filesize
1.9MB
MD59c7ad6fbeecee71bc7d4d6cf23e288e8
SHA155b4e38630a8eb59d2605814362e36de63c556a5
SHA2560f6e8325030b23d6d61246808d83ba369b75de35069b060ce8a3a6ac71bb7af6
SHA512ac01f875edb5b716b248a7a99c4547dfe87cd05bae6f30622a1e5e6dff02aa13cf619463125ea970887569bcac49e1e36a61ef8aca730d3dd48462a6e9ac97f9
-
Filesize
1.9MB
MD59c7ad6fbeecee71bc7d4d6cf23e288e8
SHA155b4e38630a8eb59d2605814362e36de63c556a5
SHA2560f6e8325030b23d6d61246808d83ba369b75de35069b060ce8a3a6ac71bb7af6
SHA512ac01f875edb5b716b248a7a99c4547dfe87cd05bae6f30622a1e5e6dff02aa13cf619463125ea970887569bcac49e1e36a61ef8aca730d3dd48462a6e9ac97f9
-
Filesize
1.9MB
MD59c7ad6fbeecee71bc7d4d6cf23e288e8
SHA155b4e38630a8eb59d2605814362e36de63c556a5
SHA2560f6e8325030b23d6d61246808d83ba369b75de35069b060ce8a3a6ac71bb7af6
SHA512ac01f875edb5b716b248a7a99c4547dfe87cd05bae6f30622a1e5e6dff02aa13cf619463125ea970887569bcac49e1e36a61ef8aca730d3dd48462a6e9ac97f9
-
Filesize
1.9MB
MD59c7ad6fbeecee71bc7d4d6cf23e288e8
SHA155b4e38630a8eb59d2605814362e36de63c556a5
SHA2560f6e8325030b23d6d61246808d83ba369b75de35069b060ce8a3a6ac71bb7af6
SHA512ac01f875edb5b716b248a7a99c4547dfe87cd05bae6f30622a1e5e6dff02aa13cf619463125ea970887569bcac49e1e36a61ef8aca730d3dd48462a6e9ac97f9
-
Filesize
1.9MB
MD59c7ad6fbeecee71bc7d4d6cf23e288e8
SHA155b4e38630a8eb59d2605814362e36de63c556a5
SHA2560f6e8325030b23d6d61246808d83ba369b75de35069b060ce8a3a6ac71bb7af6
SHA512ac01f875edb5b716b248a7a99c4547dfe87cd05bae6f30622a1e5e6dff02aa13cf619463125ea970887569bcac49e1e36a61ef8aca730d3dd48462a6e9ac97f9