Analysis
-
max time kernel
135s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
d224ee4c9385c0cd3f28cfb15576463ff72a2f6e60db129e6c7be3d7ac1ae962.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d224ee4c9385c0cd3f28cfb15576463ff72a2f6e60db129e6c7be3d7ac1ae962.dll
Resource
win10v2004-20220812-en
General
-
Target
d224ee4c9385c0cd3f28cfb15576463ff72a2f6e60db129e6c7be3d7ac1ae962.dll
-
Size
1.5MB
-
MD5
c5d86aadcff6c25cddb564629cfffc59
-
SHA1
757f779daf4fe13c54e2ddc739c52e1e53e713a2
-
SHA256
d224ee4c9385c0cd3f28cfb15576463ff72a2f6e60db129e6c7be3d7ac1ae962
-
SHA512
e3f084927de91908590df8b419caf55fd81c5b00b25cbc434e00ccb19760104ce0ac1c330194102f95ba047f1533d6ce75697ad6d58062683d3cbfb8290f9139
-
SSDEEP
3072:er7/bDCwYqINL9rQ1/UnLoJRc/ehNT8X3l1Hjr/r7:6CfhdQ1/GcJRi0eX
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SENS\Parameters\ServiceDll = "C:\\PROGRA~3\\dimaimdotem.dat" rundll32.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\PROGRA~3\dimaimdotem.dat rundll32.exe File opened for modification C:\PROGRA~3\dimaimdotem.dat rundll32.exe File created C:\PROGRA~3\metodmiamid.dat rundll32.exe File opened for modification C:\PROGRA~3\metodmiamid.dat rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{0D48BFC8-843A-4310-9863-1348A5A1E3B0}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{0D48BFC8-843A-4310-9863-1348A5A1E3B0}.crmlog dllhost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1056 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 928 Process not Found 928 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1056 rundll32.exe Token: SeDebugPrivilege 1056 rundll32.exe Token: SeDebugPrivilege 1056 rundll32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1952 wrote to memory of 1056 1952 rundll32.exe 28 PID 1056 wrote to memory of 588 1056 rundll32.exe 23 PID 1056 wrote to memory of 1168 1056 rundll32.exe 29 PID 1056 wrote to memory of 1168 1056 rundll32.exe 29 PID 1056 wrote to memory of 1168 1056 rundll32.exe 29 PID 1056 wrote to memory of 1168 1056 rundll32.exe 29 PID 1168 wrote to memory of 432 1168 cmd.exe 31 PID 1168 wrote to memory of 432 1168 cmd.exe 31 PID 1168 wrote to memory of 432 1168 cmd.exe 31 PID 1168 wrote to memory of 432 1168 cmd.exe 31 PID 432 wrote to memory of 1436 432 net.exe 32 PID 432 wrote to memory of 1436 432 net.exe 32 PID 432 wrote to memory of 1436 432 net.exe 32 PID 432 wrote to memory of 1436 432 net.exe 32 PID 1056 wrote to memory of 804 1056 rundll32.exe 34 PID 1056 wrote to memory of 804 1056 rundll32.exe 34 PID 1056 wrote to memory of 804 1056 rundll32.exe 34 PID 1056 wrote to memory of 804 1056 rundll32.exe 34 PID 804 wrote to memory of 1752 804 cmd.exe 36 PID 804 wrote to memory of 1752 804 cmd.exe 36 PID 804 wrote to memory of 1752 804 cmd.exe 36 PID 804 wrote to memory of 1752 804 cmd.exe 36 PID 1752 wrote to memory of 1320 1752 net.exe 37 PID 1752 wrote to memory of 1320 1752 net.exe 37 PID 1752 wrote to memory of 1320 1752 net.exe 37 PID 1752 wrote to memory of 1320 1752 net.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d224ee4c9385c0cd3f28cfb15576463ff72a2f6e60db129e6c7be3d7ac1ae962.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d224ee4c9385c0cd3f28cfb15576463ff72a2f6e60db129e6c7be3d7ac1ae962.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net start COMSysApp3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\net.exenet start COMSysApp4⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start COMSysApp5⤵PID:1436
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start SENS3⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\net.exenet start SENS4⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SENS5⤵PID:1320
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:588
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:336