Analysis
-
max time kernel
283s -
max time network
344s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
c8d720612e33704b360d41d623010187cc29b0cc7a9809120a0d7306d3cd22db.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8d720612e33704b360d41d623010187cc29b0cc7a9809120a0d7306d3cd22db.dll
Resource
win10v2004-20221111-en
General
-
Target
c8d720612e33704b360d41d623010187cc29b0cc7a9809120a0d7306d3cd22db.dll
-
Size
171KB
-
MD5
8c0c2527086d57172e75292a150450a6
-
SHA1
f3170ee5b296f561281a33a38b9e24aafbb95e81
-
SHA256
c8d720612e33704b360d41d623010187cc29b0cc7a9809120a0d7306d3cd22db
-
SHA512
47fbb9dbbaaac04b356bc7c7104c07e90a3bbd32bbc0832c1b8698fa02ca1aea193736894870a94431ced569a597db29da9afb307f4f70800b9344302f0c1905
-
SSDEEP
3072:Nd1t3qieZu1jDv+pbceOedNvviYK7JLZGIyNpEcVkOGMnIfCG7os0j71:/1tAc1B0NvviYK7JLZGDpEBOGsIfCG7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,rundll32.exe start" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mywinsys.ini rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3944 rundll32.exe 3944 rundll32.exe 3944 rundll32.exe 3944 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3944 rundll32.exe Token: SeDebugPrivilege 3944 rundll32.exe Token: SeDebugPrivilege 3944 rundll32.exe Token: SeDebugPrivilege 3944 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3944 2624 rundll32.exe 80 PID 2624 wrote to memory of 3944 2624 rundll32.exe 80 PID 2624 wrote to memory of 3944 2624 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8d720612e33704b360d41d623010187cc29b0cc7a9809120a0d7306d3cd22db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8d720612e33704b360d41d623010187cc29b0cc7a9809120a0d7306d3cd22db.dll,#12⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-