Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2700000.dll
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2700000.dll
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
2700000.dll
-
Size
432KB
-
MD5
48bfb197c90d573c36b9e663e956e20a
-
SHA1
5156a2afea820702ceffb01f30206ce8637b638c
-
SHA256
ab53894c820ba5717a3b43d053fee8dbec2be37f2877b022135a1b097a7a24ad
-
SHA512
4406f05f65e06128deaffbf55d9e5d80bd55effa94548007ead9998e026f78e296c6324980ebf9323457adc7aebc2e1a226c535b651b32c6f56f58384e621ee5
-
SSDEEP
12288:MI7ndMfOx7MnnAZWADGK5einHoXnp8YR:DeOZMnAzGK5eiOn+YR
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3716 3756 WerFault.exe 71 3896 3404 WerFault.exe 105 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1336 taskmgr.exe 1336 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1336 taskmgr.exe Token: SeSystemProfilePrivilege 1336 taskmgr.exe Token: SeCreateGlobalPrivilege 1336 taskmgr.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe 1336 taskmgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3756 3508 rundll32.exe 71 PID 3508 wrote to memory of 3756 3508 rundll32.exe 71 PID 3508 wrote to memory of 3756 3508 rundll32.exe 71 PID 4144 wrote to memory of 5108 4144 cmd.exe 103 PID 4144 wrote to memory of 5108 4144 cmd.exe 103 PID 5108 wrote to memory of 3404 5108 rundll32.exe 105 PID 5108 wrote to memory of 3404 5108 rundll32.exe 105 PID 5108 wrote to memory of 3404 5108 rundll32.exe 105 PID 4144 wrote to memory of 4408 4144 cmd.exe 104 PID 4144 wrote to memory of 4408 4144 cmd.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2700000.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2700000.dll,#12⤵PID:3756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 6003⤵
- Program crash
PID:3716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3756 -ip 37561⤵PID:4840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3972
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\system32\rundll32.exerundll32 2700000.dll,Initialize2⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\rundll32.exerundll32 2700000.dll,Initialize3⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 6084⤵
- Program crash
PID:3896
-
-
-
-
C:\Windows\system32\rundll32.exerundll32 2700000.dll,#12⤵PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3404 -ip 34041⤵PID:2204
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1336