Analysis
-
max time kernel
14s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
fb23a49817bffc0851ef3a1186414a5434e0fce90788be1bfba0fde8969f833b.dll
Resource
win7-20221111-en
General
-
Target
fb23a49817bffc0851ef3a1186414a5434e0fce90788be1bfba0fde8969f833b.dll
-
Size
321KB
-
MD5
09b0f54b3f2c2674ce9f2adfedd166b0
-
SHA1
8f0e7f2287f39382bb5aea88f6ff3fbb0bae3fa0
-
SHA256
fb23a49817bffc0851ef3a1186414a5434e0fce90788be1bfba0fde8969f833b
-
SHA512
188428f80f4fbeb9aec130d8d9f6a4a9d5d276a4bbeb3963a2a03c8fb7df62b8847844f1e495b70577794d756e381f85095b1b9a7a2cba8074faadcef8e8926a
-
SSDEEP
6144:1is9PaG1wvxJaNxqcucvCN6RMYRBKgrFZpXBzXpEeq:Ys9SG16xJavqhcvCNYMYRBTF/hmeq
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\rundll32.exe = "C:\\Windows\\SysWOW64\\rundll32.exe:*:enabled:@shell32.dll,-1" rundll32.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 4356 rundll32mgr.exe -
resource yara_rule behavioral2/memory/4356-137-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4356 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4296 4356 WerFault.exe 77 1668 2196 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4356 rundll32mgr.exe 4356 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe 4356 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4356 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2196 2732 rundll32.exe 76 PID 2732 wrote to memory of 2196 2732 rundll32.exe 76 PID 2732 wrote to memory of 2196 2732 rundll32.exe 76 PID 2196 wrote to memory of 4356 2196 rundll32.exe 77 PID 2196 wrote to memory of 4356 2196 rundll32.exe 77 PID 2196 wrote to memory of 4356 2196 rundll32.exe 77 PID 4356 wrote to memory of 616 4356 rundll32mgr.exe 3 PID 4356 wrote to memory of 616 4356 rundll32mgr.exe 3 PID 4356 wrote to memory of 616 4356 rundll32mgr.exe 3 PID 4356 wrote to memory of 616 4356 rundll32mgr.exe 3 PID 4356 wrote to memory of 616 4356 rundll32mgr.exe 3 PID 4356 wrote to memory of 616 4356 rundll32mgr.exe 3 PID 4356 wrote to memory of 672 4356 rundll32mgr.exe 1 PID 4356 wrote to memory of 672 4356 rundll32mgr.exe 1 PID 4356 wrote to memory of 672 4356 rundll32mgr.exe 1 PID 4356 wrote to memory of 672 4356 rundll32mgr.exe 1 PID 4356 wrote to memory of 672 4356 rundll32mgr.exe 1 PID 4356 wrote to memory of 672 4356 rundll32mgr.exe 1 PID 4356 wrote to memory of 788 4356 rundll32mgr.exe 8 PID 4356 wrote to memory of 788 4356 rundll32mgr.exe 8 PID 4356 wrote to memory of 788 4356 rundll32mgr.exe 8 PID 4356 wrote to memory of 788 4356 rundll32mgr.exe 8 PID 4356 wrote to memory of 788 4356 rundll32mgr.exe 8 PID 4356 wrote to memory of 788 4356 rundll32mgr.exe 8 PID 4356 wrote to memory of 800 4356 rundll32mgr.exe 28 PID 4356 wrote to memory of 800 4356 rundll32mgr.exe 28 PID 4356 wrote to memory of 800 4356 rundll32mgr.exe 28 PID 4356 wrote to memory of 800 4356 rundll32mgr.exe 28 PID 4356 wrote to memory of 800 4356 rundll32mgr.exe 28 PID 4356 wrote to memory of 800 4356 rundll32mgr.exe 28 PID 4356 wrote to memory of 808 4356 rundll32mgr.exe 24 PID 4356 wrote to memory of 808 4356 rundll32mgr.exe 24 PID 4356 wrote to memory of 808 4356 rundll32mgr.exe 24 PID 4356 wrote to memory of 808 4356 rundll32mgr.exe 24 PID 4356 wrote to memory of 808 4356 rundll32mgr.exe 24 PID 4356 wrote to memory of 808 4356 rundll32mgr.exe 24 PID 4356 wrote to memory of 900 4356 rundll32mgr.exe 9 PID 4356 wrote to memory of 900 4356 rundll32mgr.exe 9 PID 4356 wrote to memory of 900 4356 rundll32mgr.exe 9 PID 4356 wrote to memory of 900 4356 rundll32mgr.exe 9 PID 4356 wrote to memory of 900 4356 rundll32mgr.exe 9 PID 4356 wrote to memory of 900 4356 rundll32mgr.exe 9 PID 4356 wrote to memory of 964 4356 rundll32mgr.exe 10 PID 4356 wrote to memory of 964 4356 rundll32mgr.exe 10 PID 4356 wrote to memory of 964 4356 rundll32mgr.exe 10 PID 4356 wrote to memory of 964 4356 rundll32mgr.exe 10 PID 4356 wrote to memory of 964 4356 rundll32mgr.exe 10 PID 4356 wrote to memory of 964 4356 rundll32mgr.exe 10 PID 4356 wrote to memory of 384 4356 rundll32mgr.exe 11 PID 4356 wrote to memory of 384 4356 rundll32mgr.exe 11 PID 4356 wrote to memory of 384 4356 rundll32mgr.exe 11 PID 4356 wrote to memory of 384 4356 rundll32mgr.exe 11 PID 4356 wrote to memory of 384 4356 rundll32mgr.exe 11 PID 4356 wrote to memory of 384 4356 rundll32mgr.exe 11 PID 4356 wrote to memory of 516 4356 rundll32mgr.exe 12 PID 4356 wrote to memory of 516 4356 rundll32mgr.exe 12 PID 4356 wrote to memory of 516 4356 rundll32mgr.exe 12 PID 4356 wrote to memory of 516 4356 rundll32mgr.exe 12 PID 4356 wrote to memory of 516 4356 rundll32mgr.exe 12 PID 4356 wrote to memory of 516 4356 rundll32mgr.exe 12 PID 4356 wrote to memory of 660 4356 rundll32mgr.exe 13 PID 4356 wrote to memory of 660 4356 rundll32mgr.exe 13 PID 4356 wrote to memory of 660 4356 rundll32mgr.exe 13 PID 4356 wrote to memory of 660 4356 rundll32mgr.exe 13
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:384
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:808
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3356
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3448
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3512
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3608
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3796
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4384
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4996
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4648
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:516
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1136
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2456
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1332
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2352
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1476
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1596
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1976
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:1784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2676
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2600
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2688
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb23a49817bffc0851ef3a1186414a5434e0fce90788be1bfba0fde8969f833b.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb23a49817bffc0851ef3a1186414a5434e0fce90788be1bfba0fde8969f833b.dll,#13⤵
- Modifies firewall policy service
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 102445⤵
- Program crash
PID:4296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 6084⤵
- Program crash
PID:1668
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:4920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2196 -ip 21962⤵PID:484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4356 -ip 43562⤵PID:3500
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
212KB
MD5d143b49e7630a2ed55839138b611896b
SHA193a28da6fbfc26cac63d1b89c116289f189b9ce3
SHA256784b3b57be846dcd9d3b28cc783bd722b7a87d56a02555379f366e4a88c48e0e
SHA5122aae97e3f92bfbc3636072d4577d030a006297f4893d080a312868dc3bcc3c86cd485b8d2d912ac245502df8a8ab893f28988c2c4be7c1d5a20b2522c2cfec5a
-
Filesize
212KB
MD5d143b49e7630a2ed55839138b611896b
SHA193a28da6fbfc26cac63d1b89c116289f189b9ce3
SHA256784b3b57be846dcd9d3b28cc783bd722b7a87d56a02555379f366e4a88c48e0e
SHA5122aae97e3f92bfbc3636072d4577d030a006297f4893d080a312868dc3bcc3c86cd485b8d2d912ac245502df8a8ab893f28988c2c4be7c1d5a20b2522c2cfec5a