Analysis
-
max time kernel
28s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 12:56
Behavioral task
behavioral1
Sample
30d691229423edd258edb560e15cd434e2a8c65b1a4568c44d8387693c92437c.dll
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
30d691229423edd258edb560e15cd434e2a8c65b1a4568c44d8387693c92437c.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
30d691229423edd258edb560e15cd434e2a8c65b1a4568c44d8387693c92437c.dll
-
Size
337KB
-
MD5
050816a5689877897c46df5abe42ae20
-
SHA1
9c22c52350bfd909562bcb2f0c3348c54c42ecc8
-
SHA256
30d691229423edd258edb560e15cd434e2a8c65b1a4568c44d8387693c92437c
-
SHA512
2c59c955165af3a040df4f7f5ee8b2615fde5166311f9a89a8bd206cf96608d6268f3905de2ba8ad25f462c15b74d6d4f6305b7a27dffee9aef4e5e1ec09503f
-
SSDEEP
6144:t31R9AC7Js2PctqVqcrma9X2K4TaLXN7u/HDVxA32IJ08YKlOfMTbwY:t31R9vs2PcwIcaa9XOsmQ3BCtUTbwY
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2004-56-0x00000000007A0000-0x00000000008AB000-memory.dmp upx behavioral1/memory/2004-57-0x00000000007A0000-0x00000000008AB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AiQi = "winmine.exe" rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "www.1122u.com" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.1122u.com" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2004 2028 rundll32.exe 28 PID 2028 wrote to memory of 2004 2028 rundll32.exe 28 PID 2028 wrote to memory of 2004 2028 rundll32.exe 28 PID 2028 wrote to memory of 2004 2028 rundll32.exe 28 PID 2028 wrote to memory of 2004 2028 rundll32.exe 28 PID 2028 wrote to memory of 2004 2028 rundll32.exe 28 PID 2028 wrote to memory of 2004 2028 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30d691229423edd258edb560e15cd434e2a8c65b1a4568c44d8387693c92437c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30d691229423edd258edb560e15cd434e2a8c65b1a4568c44d8387693c92437c.dll,#12⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
PID:2004
-