Analysis
-
max time kernel
42s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:56
Behavioral task
behavioral1
Sample
89df0c3f4f4703f60f225a6841d41871a7cea02b01100892671d38681a2778d5.dll
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
89df0c3f4f4703f60f225a6841d41871a7cea02b01100892671d38681a2778d5.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
89df0c3f4f4703f60f225a6841d41871a7cea02b01100892671d38681a2778d5.dll
-
Size
8KB
-
MD5
d2c149d7ca6f1c560dc88440524b94da
-
SHA1
29a06ad0600e7a9f90f6123467ad7a832832b5bc
-
SHA256
89df0c3f4f4703f60f225a6841d41871a7cea02b01100892671d38681a2778d5
-
SHA512
6a6b3261b750982c4e0a4428a516c99a5c5e8fdb73fb096c867ece576c82935de5d6a9e64b09b851c30c83947dcf379e5b157782411f7cd2f550293c00d73400
-
SSDEEP
192:UZLDnzNEbAgPklwgFUSAhKIernsnsQ1NXfaXK77OcK:UZHzNEILiSAhK+n/PyL
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\klan.sys rundll32.exe -
Sets file execution options in registry 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "ntsd -d" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentsvr.exe\Debugger = "ntsd -d" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360hotfix.exe\Debugger = "ntsd -d" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe\Debugger = "ntsd -d" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe\Debugger = "ntsd -d" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe\Debugger = "ntsd -d" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360hotfix.exe rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentsvr.exe rundll32.exe -
resource yara_rule behavioral1/memory/1612-57-0x0000000074C50000-0x0000000074C5A000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1612 1552 rundll32.exe 26 PID 1552 wrote to memory of 1612 1552 rundll32.exe 26 PID 1552 wrote to memory of 1612 1552 rundll32.exe 26 PID 1552 wrote to memory of 1612 1552 rundll32.exe 26 PID 1552 wrote to memory of 1612 1552 rundll32.exe 26 PID 1552 wrote to memory of 1612 1552 rundll32.exe 26 PID 1552 wrote to memory of 1612 1552 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89df0c3f4f4703f60f225a6841d41871a7cea02b01100892671d38681a2778d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89df0c3f4f4703f60f225a6841d41871a7cea02b01100892671d38681a2778d5.dll,#12⤵
- Drops file in Drivers directory
- Sets file execution options in registry
PID:1612
-