Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a.dll
Resource
win10v2004-20220901-en
General
-
Target
c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a.dll
-
Size
70KB
-
MD5
c3634488aa22bcfcc8cc527d0e0dd35d
-
SHA1
71528cad6849b01b3120dccf1cc05e7758c44e92
-
SHA256
c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a
-
SHA512
2dbda6883fe5e32a4d5f4222aa6ec19b6173c9803cf3d4e56696942b1198652539c90d79e76a618523288fae9371eca9b62399fb12034139a6720179bfeb4b79
-
SSDEEP
768:okFpisvuzgdwMG9hl7c1M5uEcnZ99AO5xVp385BRCwBqcqZkwZEn4LZ8:JFplSbm1rtAOrMZCkqrZkkEn4m
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 2072 rundll32.exe 17 2072 rundll32.exe 56 2072 rundll32.exe 57 2072 rundll32.exe 62 2072 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\demltv.dll rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\demltv.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 4760 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe Token: SeDebugPrivilege 2072 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2068 4864 rundll32.exe 61 PID 4864 wrote to memory of 2068 4864 rundll32.exe 61 PID 4864 wrote to memory of 2068 4864 rundll32.exe 61 PID 2068 wrote to memory of 4760 2068 rundll32.exe 82 PID 2068 wrote to memory of 4760 2068 rundll32.exe 82 PID 2068 wrote to memory of 4760 2068 rundll32.exe 82 PID 2068 wrote to memory of 2072 2068 rundll32.exe 83 PID 2068 wrote to memory of 2072 2068 rundll32.exe 83 PID 2068 wrote to memory of 2072 2068 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a.dll,#12⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s "C:\Users\Admin\AppData\Local\Temp\demltvreg.reg"3⤵
- Runs .reg file with regedit
PID:4760
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\Common Files\Microsoft Shared\demltv.dll",polmxhat3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5c3634488aa22bcfcc8cc527d0e0dd35d
SHA171528cad6849b01b3120dccf1cc05e7758c44e92
SHA256c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a
SHA5122dbda6883fe5e32a4d5f4222aa6ec19b6173c9803cf3d4e56696942b1198652539c90d79e76a618523288fae9371eca9b62399fb12034139a6720179bfeb4b79
-
Filesize
70KB
MD5c3634488aa22bcfcc8cc527d0e0dd35d
SHA171528cad6849b01b3120dccf1cc05e7758c44e92
SHA256c0223970ddff51211e8e9af8a03f5e4e64702037ef594619b7294613a861010a
SHA5122dbda6883fe5e32a4d5f4222aa6ec19b6173c9803cf3d4e56696942b1198652539c90d79e76a618523288fae9371eca9b62399fb12034139a6720179bfeb4b79