Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19-03-2023 02:25
Static task
static1
Behavioral task
behavioral1
Sample
03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe
Resource
win10-20230220-en
General
-
Target
03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe
-
Size
2.7MB
-
MD5
a38ac5c9a2cef88d3c68be534d76d2a6
-
SHA1
baf8a2757b8788e3a8251b35d94a15a884ed226b
-
SHA256
03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c
-
SHA512
030e60e5680f6d2406bfd8d7b7e7617053b19b7a727b4cdc4292e9b8646a8e296c4134e358bf86e3adbd445439b534ec6559f578ad6fcf4bdc330695c4100a9d
-
SSDEEP
49152:38Hf8sEzurvvPywc2HaDG5N4J7FAutD7HKYwEWHdI7vFgdH:38/8SKwIDG5N4JWkDmYsHdEtQ
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 1 5116 rundll32.exe 2 5116 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5116 rundll32.exe -
Suspicious use of SetThreadContext 18 IoCs
Processes:
rundll32.exedescription pid process target process PID 5116 set thread context of 1136 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 4816 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 3200 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 3924 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 5000 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 748 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 1040 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 1676 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 2172 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 4156 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 2740 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 4544 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 4552 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 4476 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 4384 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 3580 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 912 5116 rundll32.exe rundll32.exe PID 5116 set thread context of 972 5116 rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe -
Modifies registry class 64 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000007356481b100054656d7000003a0009000400efbe5456af947356481b2e00000000000000000000000000000000000000000000000000fb008700540065006d007000000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe 5116 rundll32.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 1136 rundll32.exe 4816 rundll32.exe 3200 rundll32.exe 3924 rundll32.exe 5000 rundll32.exe 748 rundll32.exe 1040 rundll32.exe 1676 rundll32.exe 2172 rundll32.exe 4156 rundll32.exe 2740 rundll32.exe 4544 rundll32.exe 4552 rundll32.exe 4476 rundll32.exe 4384 rundll32.exe 3580 rundll32.exe 912 rundll32.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exerundll32.exedescription pid process target process PID 4604 wrote to memory of 5116 4604 03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe rundll32.exe PID 4604 wrote to memory of 5116 4604 03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe rundll32.exe PID 4604 wrote to memory of 5116 4604 03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe rundll32.exe PID 5116 wrote to memory of 1136 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1136 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1136 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4816 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4816 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4816 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3200 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3200 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3200 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3924 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3924 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3924 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 5000 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 5000 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 5000 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 748 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 748 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 748 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1040 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1040 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1040 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1676 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1676 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 1676 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 2172 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 2172 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 2172 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4156 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4156 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4156 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 2740 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 2740 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 2740 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4544 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4544 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4544 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4552 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4552 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4552 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4476 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4476 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4476 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4384 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4384 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 4384 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3580 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3580 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 3580 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 912 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 912 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 912 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 972 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 972 5116 rundll32.exe rundll32.exe PID 5116 wrote to memory of 972 5116 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe"C:\Users\Admin\AppData\Local\Temp\03f493282e5511772602c3aca8ce29f9475e70e00d7f4c041e7ae58719a7f00c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 241103⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.binFilesize
403KB
MD5b4d3016a1cccde90a62b685149c832f9
SHA15d6c4ba3474e6544bd24343da564e90bba89f6f7
SHA256df6afa046a72bb55e8984cf9e2870dc62112e4b81d4fef5a94c98e1c4386e373
SHA512abf5e15b40fa03eb9390854199b9feaf0132aac756c5f07d45c81f58c8b4d909833a996a19ccfef7abb905ddb9206591b1eda49a4674bc75a7c5a9c6372590e7
-
C:\Users\Admin\AppData\Local\Temp\Wtoahoepfise.dllFilesize
3.2MB
MD529224ed15526a0f120750624beb96b8c
SHA1410eb9dfdc70a631ffb7c1288be1336d6d454fc4
SHA2564b2743b3351080c4dfed086c5b18ffcb2efd47df7faad1a390fd82afe6c0a486
SHA512b9e790513c0a340c959d72fc8ecab08d61f5913f03792c86868575c4844bf3e2d40cf3481aa5a997c2a587731e6d4780cfaab6a25a38d25faa9434613df299b3
-
\Users\Admin\AppData\Local\Temp\Wtoahoepfise.dllFilesize
3.2MB
MD529224ed15526a0f120750624beb96b8c
SHA1410eb9dfdc70a631ffb7c1288be1336d6d454fc4
SHA2564b2743b3351080c4dfed086c5b18ffcb2efd47df7faad1a390fd82afe6c0a486
SHA512b9e790513c0a340c959d72fc8ecab08d61f5913f03792c86868575c4844bf3e2d40cf3481aa5a997c2a587731e6d4780cfaab6a25a38d25faa9434613df299b3
-
memory/748-310-0x0000022AAD520000-0x0000022AAD7C8000-memory.dmpFilesize
2.7MB
-
memory/748-314-0x0000022AAD520000-0x0000022AAD7C8000-memory.dmpFilesize
2.7MB
-
memory/912-563-0x000002AB05720000-0x000002AB059C8000-memory.dmpFilesize
2.7MB
-
memory/912-559-0x000002AB05720000-0x000002AB059C8000-memory.dmpFilesize
2.7MB
-
memory/1040-332-0x0000023FB06E0000-0x0000023FB0988000-memory.dmpFilesize
2.7MB
-
memory/1040-337-0x0000023FB06E0000-0x0000023FB0988000-memory.dmpFilesize
2.7MB
-
memory/1136-199-0x000002024B4B0000-0x000002024B758000-memory.dmpFilesize
2.7MB
-
memory/1136-191-0x000002024CF00000-0x000002024D040000-memory.dmpFilesize
1.2MB
-
memory/1136-192-0x000002024CF00000-0x000002024D040000-memory.dmpFilesize
1.2MB
-
memory/1136-190-0x00007FFFC1C30000-0x00007FFFC1C31000-memory.dmpFilesize
4KB
-
memory/1136-196-0x000002024B4B0000-0x000002024B758000-memory.dmpFilesize
2.7MB
-
memory/1136-195-0x0000000000170000-0x0000000000406000-memory.dmpFilesize
2.6MB
-
memory/1136-193-0x000002024B4B0000-0x000002024B758000-memory.dmpFilesize
2.7MB
-
memory/1676-359-0x000002BC1A2C0000-0x000002BC1A568000-memory.dmpFilesize
2.7MB
-
memory/1676-355-0x000002BC1A2C0000-0x000002BC1A568000-memory.dmpFilesize
2.7MB
-
memory/2172-382-0x00000233F4E80000-0x00000233F5128000-memory.dmpFilesize
2.7MB
-
memory/2172-378-0x00000233F4E80000-0x00000233F5128000-memory.dmpFilesize
2.7MB
-
memory/2740-421-0x00000140970F0000-0x0000014097398000-memory.dmpFilesize
2.7MB
-
memory/2740-427-0x00000140970F0000-0x0000014097398000-memory.dmpFilesize
2.7MB
-
memory/3200-246-0x000001F53E030000-0x000001F53E2D8000-memory.dmpFilesize
2.7MB
-
memory/3200-242-0x000001F53E030000-0x000001F53E2D8000-memory.dmpFilesize
2.7MB
-
memory/3580-536-0x00000135BAEF0000-0x00000135BB198000-memory.dmpFilesize
2.7MB
-
memory/3580-540-0x00000135BAEF0000-0x00000135BB198000-memory.dmpFilesize
2.7MB
-
memory/3924-269-0x000001EBB3700000-0x000001EBB39A8000-memory.dmpFilesize
2.7MB
-
memory/3924-265-0x000001EBB3700000-0x000001EBB39A8000-memory.dmpFilesize
2.7MB
-
memory/4156-400-0x0000014BDC160000-0x0000014BDC408000-memory.dmpFilesize
2.7MB
-
memory/4156-405-0x0000014BDC160000-0x0000014BDC408000-memory.dmpFilesize
2.7MB
-
memory/4384-513-0x00000177C3170000-0x00000177C3418000-memory.dmpFilesize
2.7MB
-
memory/4384-518-0x00000177C3170000-0x00000177C3418000-memory.dmpFilesize
2.7MB
-
memory/4476-491-0x000001B898F40000-0x000001B8991E8000-memory.dmpFilesize
2.7MB
-
memory/4476-495-0x000001B898F40000-0x000001B8991E8000-memory.dmpFilesize
2.7MB
-
memory/4544-445-0x0000023E3BB80000-0x0000023E3BE28000-memory.dmpFilesize
2.7MB
-
memory/4544-450-0x0000023E3BB80000-0x0000023E3BE28000-memory.dmpFilesize
2.7MB
-
memory/4552-468-0x000001A05D010000-0x000001A05D2B8000-memory.dmpFilesize
2.7MB
-
memory/4552-472-0x000001A05D010000-0x000001A05D2B8000-memory.dmpFilesize
2.7MB
-
memory/4604-120-0x0000000004FB0000-0x00000000052EF000-memory.dmpFilesize
3.2MB
-
memory/4604-123-0x0000000004FB0000-0x00000000052EF000-memory.dmpFilesize
3.2MB
-
memory/4604-122-0x0000000000400000-0x0000000002D60000-memory.dmpFilesize
41.4MB
-
memory/4816-217-0x0000025CE4520000-0x0000025CE4660000-memory.dmpFilesize
1.2MB
-
memory/4816-220-0x0000025CE2AD0000-0x0000025CE2D78000-memory.dmpFilesize
2.7MB
-
memory/4816-214-0x00007FFFC1C30000-0x00007FFFC1C31000-memory.dmpFilesize
4KB
-
memory/4816-216-0x0000025CE4520000-0x0000025CE4660000-memory.dmpFilesize
1.2MB
-
memory/4816-222-0x0000025CE2AD0000-0x0000025CE2D78000-memory.dmpFilesize
2.7MB
-
memory/4816-218-0x0000025CE2AD0000-0x0000025CE2D78000-memory.dmpFilesize
2.7MB
-
memory/4816-219-0x0000025CE2AD0000-0x0000025CE2D78000-memory.dmpFilesize
2.7MB
-
memory/5000-291-0x000001EA127D0000-0x000001EA12A78000-memory.dmpFilesize
2.7MB
-
memory/5000-287-0x000001EA127D0000-0x000001EA12A78000-memory.dmpFilesize
2.7MB
-
memory/5116-204-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-187-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-209-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-224-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-226-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-227-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-228-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-230-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-233-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-232-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/5116-234-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-231-0x0000000000400000-0x0000000000749000-memory.dmpFilesize
3.3MB
-
memory/5116-235-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-207-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-205-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-210-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-203-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-215-0x0000000000400000-0x0000000000749000-memory.dmpFilesize
3.3MB
-
memory/5116-211-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-201-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-194-0x0000000000400000-0x0000000000749000-memory.dmpFilesize
3.3MB
-
memory/5116-208-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/5116-184-0x0000000004CD0000-0x0000000004CD1000-memory.dmpFilesize
4KB
-
memory/5116-186-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-185-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-183-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-182-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-180-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-179-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-177-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-173-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-176-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-175-0x00000000060A0000-0x00000000061E0000-memory.dmpFilesize
1.2MB
-
memory/5116-174-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/5116-172-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-171-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-162-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-161-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-160-0x0000000006200000-0x0000000006201000-memory.dmpFilesize
4KB
-
memory/5116-159-0x0000000000400000-0x0000000000749000-memory.dmpFilesize
3.3MB
-
memory/5116-158-0x0000000005470000-0x0000000005FD6000-memory.dmpFilesize
11.4MB
-
memory/5116-131-0x0000000000400000-0x0000000000749000-memory.dmpFilesize
3.3MB
-
memory/5116-126-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB