Analysis
-
max time kernel
150s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
afbd6562b4a8fb677e0c01d14f81384c3b07a8dd55d74271f83aa220e9a277e4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
afbd6562b4a8fb677e0c01d14f81384c3b07a8dd55d74271f83aa220e9a277e4.dll
Resource
win10v2004-20221111-en
General
-
Target
afbd6562b4a8fb677e0c01d14f81384c3b07a8dd55d74271f83aa220e9a277e4.dll
-
Size
30.2MB
-
MD5
c3022ed2bd994f040336e84889a1d4eb
-
SHA1
3edd971cccb71a40ac49dc1e61404540a99be17b
-
SHA256
afbd6562b4a8fb677e0c01d14f81384c3b07a8dd55d74271f83aa220e9a277e4
-
SHA512
ebab6b39b7695c5b1bca44f4c0039925648105c75d1d19ad3635dd0bfd4191a842d3929e585d2d9d0fe97e26187e17b572c044290c225719a33356a6df5ded4f
-
SSDEEP
6144:PYIlNB8+K+8VfBFRgP8tDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDP:wIlE+8V5gP
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 55 1512 rundll32.exe 74 1512 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinX86.log regsvr32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Mnetl\Hnlla.don rundll32.exe File opened for modification C:\Program Files\Mnetl\Hnlla.don rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32\ = "=" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1376 2288 regsvr32.exe 82 PID 2288 wrote to memory of 1376 2288 regsvr32.exe 82 PID 2288 wrote to memory of 1376 2288 regsvr32.exe 82 PID 1376 wrote to memory of 1512 1376 regsvr32.exe 83 PID 1376 wrote to memory of 1512 1376 regsvr32.exe 83 PID 1376 wrote to memory of 1512 1376 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\afbd6562b4a8fb677e0c01d14f81384c3b07a8dd55d74271f83aa220e9a277e4.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\afbd6562b4a8fb677e0c01d14f81384c3b07a8dd55d74271f83aa220e9a277e4.dll2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\windows\SysWOW64\rundll32.exeC:\windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\AFBD65~1.DLL comdl23⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-