Analysis
-
max time kernel
142s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:18
Behavioral task
behavioral1
Sample
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll
Resource
win10v2004-20221111-en
General
-
Target
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll
-
Size
178KB
-
MD5
215193140795e86cf7cf538bbe935188
-
SHA1
a4e240d63976a940e5aa6da6cd5eca41967af8dd
-
SHA256
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
-
SHA512
d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9
-
SSDEEP
3072:iRbvvVszkyf+H8M6JMnY/YpBi9teVjw2x7iCEujjvsYFRg/L5HyfIetstITqYsCn:CbvvVsQO+cMuugYni+VviC7jvFc/LIft
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\inf\\Mchicken.dll" rundll32.exe -
resource yara_rule behavioral1/memory/956-57-0x0000000071000000-0x0000000071061000-memory.dmp vmprotect behavioral1/files/0x000a0000000132fb-59.dat vmprotect behavioral1/files/0x000a0000000132fb-58.dat vmprotect behavioral1/memory/884-61-0x0000000071000000-0x0000000071061000-memory.dmp vmprotect behavioral1/memory/884-63-0x0000000071000000-0x0000000071061000-memory.dmp vmprotect -
Loads dropped DLL 1 IoCs
pid Process 884 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\inf\Mchicken.dll rundll32.exe File created C:\Windows\inf\Mchicken.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 880 956 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 1792 wrote to memory of 956 1792 rundll32.exe 28 PID 956 wrote to memory of 880 956 rundll32.exe 30 PID 956 wrote to memory of 880 956 rundll32.exe 30 PID 956 wrote to memory of 880 956 rundll32.exe 30 PID 956 wrote to memory of 880 956 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 2963⤵
- Program crash
PID:880
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5215193140795e86cf7cf538bbe935188
SHA1a4e240d63976a940e5aa6da6cd5eca41967af8dd
SHA256ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
SHA512d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9
-
Filesize
178KB
MD5215193140795e86cf7cf538bbe935188
SHA1a4e240d63976a940e5aa6da6cd5eca41967af8dd
SHA256ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
SHA512d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9