Analysis
-
max time kernel
242s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
2ea8920bf40d1f6d3822b08f2363b69001e48719551f19993cbaa11165fc4b4a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ea8920bf40d1f6d3822b08f2363b69001e48719551f19993cbaa11165fc4b4a.dll
Resource
win10v2004-20220812-en
General
-
Target
2ea8920bf40d1f6d3822b08f2363b69001e48719551f19993cbaa11165fc4b4a.dll
-
Size
72KB
-
MD5
9d077ecbe40bbea4490ec87ab1279d80
-
SHA1
5b6280a660d0143f90e73fdcd3f88618ea1ae17a
-
SHA256
2ea8920bf40d1f6d3822b08f2363b69001e48719551f19993cbaa11165fc4b4a
-
SHA512
33640f89841f5a5869ee95c8e776d9f61f51f21c25fb45c66f4b39c72c69f87ff681e26d379ceec560adf6735d54ba8830c6c2ea908975790e634b986dc1062d
-
SSDEEP
1536:ymv6BS7LL1w+o9yHSmGhbw9QDyJYzC7gtop0Z:yVBon1wJyHS04RzsKAE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 568 hrlD5F6.tmp 1304 lwnfsm.exe -
Loads dropped DLL 2 IoCs
pid Process 768 rundll32.exe 768 rundll32.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\U: rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\lwnfsm.exe hrlD5F6.tmp File opened for modification C:\Windows\SysWOW64\lwnfsm.exe hrlD5F6.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 568 hrlD5F6.tmp 1304 lwnfsm.exe -
Suspicious behavior: MapViewOfSection 48 IoCs
pid Process 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 568 hrlD5F6.tmp 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe 1304 lwnfsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 568 hrlD5F6.tmp Token: SeDebugPrivilege 1304 lwnfsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 680 wrote to memory of 768 680 rundll32.exe 28 PID 768 wrote to memory of 568 768 rundll32.exe 29 PID 768 wrote to memory of 568 768 rundll32.exe 29 PID 768 wrote to memory of 568 768 rundll32.exe 29 PID 768 wrote to memory of 568 768 rundll32.exe 29 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 368 568 hrlD5F6.tmp 5 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 380 568 hrlD5F6.tmp 4 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 416 568 hrlD5F6.tmp 3 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 460 568 hrlD5F6.tmp 2 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 476 568 hrlD5F6.tmp 1 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 484 568 hrlD5F6.tmp 8 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 596 568 hrlD5F6.tmp 27 PID 568 wrote to memory of 672 568 hrlD5F6.tmp 26 PID 568 wrote to memory of 672 568 hrlD5F6.tmp 26 PID 568 wrote to memory of 672 568 hrlD5F6.tmp 26 PID 568 wrote to memory of 672 568 hrlD5F6.tmp 26
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1036
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1672
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:276
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1124
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1096
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:840
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
-
C:\Windows\SysWOW64\lwnfsm.exeC:\Windows\SysWOW64\lwnfsm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1604
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:980
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ea8920bf40d1f6d3822b08f2363b69001e48719551f19993cbaa11165fc4b4a.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ea8920bf40d1f6d3822b08f2363b69001e48719551f19993cbaa11165fc4b4a.dll,#13⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\hrlD5F6.tmpC:\Users\Admin\AppData\Local\Temp\hrlD5F6.tmp4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:568
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD53d132a999ebf1affd177c37172d6cf0f
SHA1e969549d7e5f4e92e1e54e625f2c3f8d8d468a4d
SHA2561f090a24fddc24cf9f5125bba3c818cef17298bc734bc53cb4425bd5021b0bcc
SHA512d4711f46dec542ae7567c2397ea861faba8e2457373bc3ec339c8ab2566e3fce10708d9ca95a25a5040aa10fdcecbe207e473998f216a23f46f833da326faeb5
-
Filesize
65KB
MD53d132a999ebf1affd177c37172d6cf0f
SHA1e969549d7e5f4e92e1e54e625f2c3f8d8d468a4d
SHA2561f090a24fddc24cf9f5125bba3c818cef17298bc734bc53cb4425bd5021b0bcc
SHA512d4711f46dec542ae7567c2397ea861faba8e2457373bc3ec339c8ab2566e3fce10708d9ca95a25a5040aa10fdcecbe207e473998f216a23f46f833da326faeb5
-
Filesize
65KB
MD53d132a999ebf1affd177c37172d6cf0f
SHA1e969549d7e5f4e92e1e54e625f2c3f8d8d468a4d
SHA2561f090a24fddc24cf9f5125bba3c818cef17298bc734bc53cb4425bd5021b0bcc
SHA512d4711f46dec542ae7567c2397ea861faba8e2457373bc3ec339c8ab2566e3fce10708d9ca95a25a5040aa10fdcecbe207e473998f216a23f46f833da326faeb5
-
Filesize
65KB
MD53d132a999ebf1affd177c37172d6cf0f
SHA1e969549d7e5f4e92e1e54e625f2c3f8d8d468a4d
SHA2561f090a24fddc24cf9f5125bba3c818cef17298bc734bc53cb4425bd5021b0bcc
SHA512d4711f46dec542ae7567c2397ea861faba8e2457373bc3ec339c8ab2566e3fce10708d9ca95a25a5040aa10fdcecbe207e473998f216a23f46f833da326faeb5
-
Filesize
65KB
MD53d132a999ebf1affd177c37172d6cf0f
SHA1e969549d7e5f4e92e1e54e625f2c3f8d8d468a4d
SHA2561f090a24fddc24cf9f5125bba3c818cef17298bc734bc53cb4425bd5021b0bcc
SHA512d4711f46dec542ae7567c2397ea861faba8e2457373bc3ec339c8ab2566e3fce10708d9ca95a25a5040aa10fdcecbe207e473998f216a23f46f833da326faeb5
-
Filesize
65KB
MD53d132a999ebf1affd177c37172d6cf0f
SHA1e969549d7e5f4e92e1e54e625f2c3f8d8d468a4d
SHA2561f090a24fddc24cf9f5125bba3c818cef17298bc734bc53cb4425bd5021b0bcc
SHA512d4711f46dec542ae7567c2397ea861faba8e2457373bc3ec339c8ab2566e3fce10708d9ca95a25a5040aa10fdcecbe207e473998f216a23f46f833da326faeb5