Analysis
-
max time kernel
235s -
max time network
327s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4.dll
Resource
win10v2004-20221111-en
General
-
Target
827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4.dll
-
Size
34KB
-
MD5
be72e91b04fc37f7c1eb3fb429090ace
-
SHA1
0ffba2dd7bdfa6cc14cf1c4ab93dd8d9120fd02c
-
SHA256
827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4
-
SHA512
887f8f959ad391e282de40ec6dd5a88827b2857729bf2486a6edf3b31cea748e06f04726280cbcb6a6f6cd35933e3d24d577c96f9f57ae776fee49c4d108ac08
-
SSDEEP
768:A34nRoRqjFwX/Hf8wHj41lpVfn0UaEauU+75S0LIlZ2jS:84aRqhwX3ND41TWUmh+75SoIPwS
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3648 rundll32.exe 3648 rundll32.exe 4832 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\iiffcAsS.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\iiffcAsS.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\iiffcAsS.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ = "C:\\Windows\\SysWow64\\iiffcAsS.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3648 rundll32.exe 3648 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe 4832 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3648 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3648 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3648 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3112 wrote to memory of 3648 3112 rundll32.exe 81 PID 3112 wrote to memory of 3648 3112 rundll32.exe 81 PID 3112 wrote to memory of 3648 3112 rundll32.exe 81 PID 3648 wrote to memory of 596 3648 rundll32.exe 3 PID 3648 wrote to memory of 4832 3648 rundll32.exe 82 PID 3648 wrote to memory of 4832 3648 rundll32.exe 82 PID 3648 wrote to memory of 4832 3648 rundll32.exe 82
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:596
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\iiffcAsS.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5be72e91b04fc37f7c1eb3fb429090ace
SHA10ffba2dd7bdfa6cc14cf1c4ab93dd8d9120fd02c
SHA256827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4
SHA512887f8f959ad391e282de40ec6dd5a88827b2857729bf2486a6edf3b31cea748e06f04726280cbcb6a6f6cd35933e3d24d577c96f9f57ae776fee49c4d108ac08
-
Filesize
34KB
MD5be72e91b04fc37f7c1eb3fb429090ace
SHA10ffba2dd7bdfa6cc14cf1c4ab93dd8d9120fd02c
SHA256827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4
SHA512887f8f959ad391e282de40ec6dd5a88827b2857729bf2486a6edf3b31cea748e06f04726280cbcb6a6f6cd35933e3d24d577c96f9f57ae776fee49c4d108ac08
-
Filesize
34KB
MD5be72e91b04fc37f7c1eb3fb429090ace
SHA10ffba2dd7bdfa6cc14cf1c4ab93dd8d9120fd02c
SHA256827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4
SHA512887f8f959ad391e282de40ec6dd5a88827b2857729bf2486a6edf3b31cea748e06f04726280cbcb6a6f6cd35933e3d24d577c96f9f57ae776fee49c4d108ac08
-
Filesize
34KB
MD5be72e91b04fc37f7c1eb3fb429090ace
SHA10ffba2dd7bdfa6cc14cf1c4ab93dd8d9120fd02c
SHA256827b6ee26f2ed5cea99254e47b55278244daf3b26007c45a13540e5ffde02ae4
SHA512887f8f959ad391e282de40ec6dd5a88827b2857729bf2486a6edf3b31cea748e06f04726280cbcb6a6f6cd35933e3d24d577c96f9f57ae776fee49c4d108ac08