Analysis
-
max time kernel
261s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 21:04
Behavioral task
behavioral1
Sample
9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e.dll
Resource
win10v2004-20220812-en
General
-
Target
9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e.dll
-
Size
34KB
-
MD5
00b791646c7e4d6cc95b2f214b6b2d2c
-
SHA1
86fab903097c35f1be40c2aaa6d42c1ce326fb88
-
SHA256
9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e
-
SHA512
25902364203ff40de6a35eeb819398a32ce7ff7442e78c26e1470e488a9fd8a0e0b6156123d23121963757058142278a1dae0c5b3964c8dc28898fbee8daf22c
-
SSDEEP
768:AgeUxHpbt4Vw3N0e2YkDVjK4trS2x7SoI/9WOBw61PafhCnbcuyD7UAfa:AxUHt4Vwd0nYSZJko6FC4nouy8Afa
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a00000001330d-59.dat acprotect -
resource yara_rule behavioral1/memory/1800-56-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral1/files/0x000a00000001330d-59.dat upx behavioral1/memory/620-60-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral1/memory/1800-61-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral1/memory/620-62-0x0000000010000000-0x000000001001E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msisue.dll rundll32.exe File opened for modification C:\Windows\msisue.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e.dll,1314612079,-85730467,-1814625877" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1532 wrote to memory of 1800 1532 rundll32.exe 28 PID 1800 wrote to memory of 620 1800 rundll32.exe 29 PID 1800 wrote to memory of 620 1800 rundll32.exe 29 PID 1800 wrote to memory of 620 1800 rundll32.exe 29 PID 1800 wrote to memory of 620 1800 rundll32.exe 29 PID 1800 wrote to memory of 620 1800 rundll32.exe 29 PID 1800 wrote to memory of 620 1800 rundll32.exe 29 PID 1800 wrote to memory of 620 1800 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e.dll,#12⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\msisue.dll",_RunAs@163⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD500b791646c7e4d6cc95b2f214b6b2d2c
SHA186fab903097c35f1be40c2aaa6d42c1ce326fb88
SHA2569f70cf57374e625efbe6b2b02a742875f3e0bd2d1ae65f3d4b024102eaf1ef7e
SHA51225902364203ff40de6a35eeb819398a32ce7ff7442e78c26e1470e488a9fd8a0e0b6156123d23121963757058142278a1dae0c5b3964c8dc28898fbee8daf22c