Analysis
-
max time kernel
154s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll
Resource
win10v2004-20220812-en
General
-
Target
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll
-
Size
946KB
-
MD5
68cf656c0e8e869707725e5918cd2b94
-
SHA1
be5be1c39411016e7ef2a1d1a7d0fec04f965af3
-
SHA256
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134
-
SHA512
11b00eba0191f8e1b6b42c17efb56ec9da1859f4cca688f9433d7343b3a0e20e06177616d9c84215e89869316e8dcb7ff950b2d8ca525678c50c6962e89e15d5
-
SSDEEP
24576:rp81j8Ey3dNOP7wv1APccrX2HaFQc7CAK5e865DtYZI6:uj8Ey3dgw9APccrX2HaFQc2/oDYZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ygh = "regsvr32 /s \"C:\\Users\\Admin\\AppData\\Roaming\\GBQHURCC.jpg\"" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 4584 2092 rundll32.exe 80 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4584 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4584 iexplore.exe 4584 iexplore.exe 4584 iexplore.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2092 3524 rundll32.exe 79 PID 3524 wrote to memory of 2092 3524 rundll32.exe 79 PID 3524 wrote to memory of 2092 3524 rundll32.exe 79 PID 2092 wrote to memory of 4584 2092 rundll32.exe 80 PID 2092 wrote to memory of 4584 2092 rundll32.exe 80 PID 2092 wrote to memory of 4584 2092 rundll32.exe 80 PID 2092 wrote to memory of 4584 2092 rundll32.exe 80 PID 2092 wrote to memory of 4584 2092 rundll32.exe 80 PID 4584 wrote to memory of 3784 4584 iexplore.exe 81 PID 4584 wrote to memory of 3784 4584 iexplore.exe 81 PID 4584 wrote to memory of 3784 4584 iexplore.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v ygh /d "regsvr32 /s """C:\Users\Admin\AppData\Roaming\GBQHURCC.jpg"""" /f4⤵
- Adds Run key to start application
PID:3784
-
-
-