Analysis
-
max time kernel
162s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe
Resource
win10v2004-20220812-en
General
-
Target
c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe
-
Size
126KB
-
MD5
ea272cc0a9e2e49a5fa04f4ea04baef4
-
SHA1
54f79b4233a7981e72e6a2bffeb9dfb2cb913d35
-
SHA256
c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24
-
SHA512
277f8fca063f69755068d87d03d44c6819c91f7ec7e349fe8b5e83f3b71c9ab754933b927a5bd586c23108873ca589eea3f9a22a358906a62ce19a1560a8d3ae
-
SSDEEP
1536:2UBGDs5dcfacfNogEJ/0MvC3sNpxuhvQ7jsSj9J4OmjzH1DAanaamScEUFQTPCMu:2I5d0fNLOP68NpEvQntBHKHR5nIiaMmD
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3208 rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jmp98Cq7 = "rundll32.exe C:\\9x7kQ8\\jmp98Cq7.dll,GrhcRgxar" c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Windows\\SysWOW64\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3208 set thread context of 528 3208 rundll32.exe 82 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "www.naver.com" svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3208 5052 c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe 79 PID 5052 wrote to memory of 3208 5052 c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe 79 PID 5052 wrote to memory of 3208 5052 c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe 79 PID 5052 wrote to memory of 3680 5052 c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe 80 PID 5052 wrote to memory of 3680 5052 c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe 80 PID 5052 wrote to memory of 3680 5052 c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe 80 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82 PID 3208 wrote to memory of 528 3208 rundll32.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe"C:\Users\Admin\AppData\Local\Temp\c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\9x7kQ8\jmp98Cq7.dll,GrhcRgxar2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\c6b1ea1dc17260a09c0b277a766ecdc73c3257f318bc00fbec95bd9fca48ce24.exe"2⤵PID:3680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5002c306669afa6d78fc2b4b247bbf611
SHA1d50b49ab153cd2c427a5a22f148677e24e942c32
SHA25684d1b3a687e6bd96a580499ff9f970a8253501501718c486605f20e4e41a1621
SHA51257d655820c7fe52b80c6d0c2777d8e8d9335a0fcc5d0da55e4e46e79cc714f4653842556071b5f28ff6a201e0480b225f00ff2bff259eef391757a19398158fd
-
Filesize
102KB
MD5002c306669afa6d78fc2b4b247bbf611
SHA1d50b49ab153cd2c427a5a22f148677e24e942c32
SHA25684d1b3a687e6bd96a580499ff9f970a8253501501718c486605f20e4e41a1621
SHA51257d655820c7fe52b80c6d0c2777d8e8d9335a0fcc5d0da55e4e46e79cc714f4653842556071b5f28ff6a201e0480b225f00ff2bff259eef391757a19398158fd