Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 06:44
Behavioral task
behavioral1
Sample
c2f23d1a225350f7ca130772331f8eabc054f727a480fff92507e3ce88853ced.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2f23d1a225350f7ca130772331f8eabc054f727a480fff92507e3ce88853ced.dll
Resource
win10v2004-20220901-en
General
-
Target
c2f23d1a225350f7ca130772331f8eabc054f727a480fff92507e3ce88853ced.dll
-
Size
128KB
-
MD5
2f259e090a3161d1c21b38be732c3885
-
SHA1
61a9f28f5b99a248d8a74e7a47f3868eb85fda04
-
SHA256
c2f23d1a225350f7ca130772331f8eabc054f727a480fff92507e3ce88853ced
-
SHA512
e8d0d51ba787ec700aa90922e157adbe62c0a6f4ed08eaff934d3f0fc2a15bcd6008ada52137712d1299d7b78793746b1ac7d30b7b0b2c7ed0e32302dad52b08
-
SSDEEP
3072:eNJH83yeup+FbGfcRcYUccsgwyFGma+lskHlf5:elr+RcYUagwyFpa+l5h
Malware Config
Signatures
-
Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{5F92C70A-70A4-2B5F-3C70-D60A4E82C509} rundll32.exe -
resource yara_rule behavioral2/memory/2732-133-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2732-134-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3}\ rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\DZFAHNIP.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\DZFAHNIP.dll rundll32.exe File created C:\Windows\SysWOW64\JFLGMTOU.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\JFLGMTOU.dll rundll32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.google.cn rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.baidu.com rundll32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\New Windows\Allow rundll32.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F92C70A-70A4-2B5F-3C70-D60A4E82C509}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F92C70A-70A4-2B5F-3C70-D60A4E82C509}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F92C70A-70A4-2B5F-3C70-D60A4E82C509}\InprocServer32\ = "C:\\Windows\\SysWow64\\JFLGMTOU.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F92C70A-70A4-2B5F-3C70-D60A4E82C509}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F92C70A-70A4-2B5F-3C70-D60A4E82C509} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F93C71A5-1A4E-C5F9-D71A-70A4E82C60A3}\InprocServer32\ = "C:\\Windows\\SysWow64\\DZFAHNIP.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2732 3068 rundll32.exe 80 PID 3068 wrote to memory of 2732 3068 rundll32.exe 80 PID 3068 wrote to memory of 2732 3068 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2f23d1a225350f7ca130772331f8eabc054f727a480fff92507e3ce88853ced.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2f23d1a225350f7ca130772331f8eabc054f727a480fff92507e3ce88853ced.dll,#12⤵
- Modifies Shared Task Scheduler registry keys
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2732
-