Analysis
-
max time kernel
186s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 20:18
Behavioral task
behavioral1
Sample
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll
Resource
win10v2004-20221111-en
General
-
Target
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll
-
Size
178KB
-
MD5
215193140795e86cf7cf538bbe935188
-
SHA1
a4e240d63976a940e5aa6da6cd5eca41967af8dd
-
SHA256
ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
-
SHA512
d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9
-
SSDEEP
3072:iRbvvVszkyf+H8M6JMnY/YpBi9teVjw2x7iCEujjvsYFRg/L5HyfIetstITqYsCn:CbvvVsQO+cMuugYni+VviC7jvFc/LIft
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\inf\\Mchicken.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\inf\\Mchicken.dll" rundll32.exe -
resource yara_rule behavioral2/files/0x0007000000023172-134.dat vmprotect behavioral2/files/0x0007000000023172-135.dat vmprotect behavioral2/memory/3320-137-0x0000000071000000-0x0000000071061000-memory.dmp vmprotect behavioral2/files/0x0007000000023172-138.dat vmprotect behavioral2/memory/3696-140-0x0000000071000000-0x0000000071061000-memory.dmp vmprotect behavioral2/memory/3696-141-0x0000000071000000-0x0000000071061000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
pid Process 2704 svchost.exe 3696 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\inf\Mchicken.dll rundll32.exe File created C:\Windows\inf\Mchicken.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3372 3320 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3320 2252 rundll32.exe 81 PID 2252 wrote to memory of 3320 2252 rundll32.exe 81 PID 2252 wrote to memory of 3320 2252 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in Windows directory
PID:3320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 6923⤵
- Program crash
PID:3372
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:2704
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ias1⤵
- Loads dropped DLL
PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3320 -ip 33201⤵PID:3540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5215193140795e86cf7cf538bbe935188
SHA1a4e240d63976a940e5aa6da6cd5eca41967af8dd
SHA256ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
SHA512d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9
-
Filesize
178KB
MD5215193140795e86cf7cf538bbe935188
SHA1a4e240d63976a940e5aa6da6cd5eca41967af8dd
SHA256ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
SHA512d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9
-
Filesize
178KB
MD5215193140795e86cf7cf538bbe935188
SHA1a4e240d63976a940e5aa6da6cd5eca41967af8dd
SHA256ddc80fa32436daf578d44314f43e7aa5aa11e53c1c002780579d1ee1e2c85426
SHA512d3399b0901f9e7cd34316aaad0db605ed6c1e9d607b68bedb7f2b60e4d3b875e54d311a6f25dce42a375758572fe1ffddb97aaae94d2ff2828712c41b4348fb9