Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 19:30
Static task
static1
Behavioral task
behavioral1
Sample
2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe
Resource
win10v2004-20230220-en
General
-
Target
2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe
-
Size
3.5MB
-
MD5
f0b44206b87b6e1df8021f076b065710
-
SHA1
5a3ea1bb1b85f83da5b38951db984b4b0eebdd6c
-
SHA256
2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40
-
SHA512
0140268b8274f1e9b34ff246cb147dd28aab1db8ded3bbffa7ab39e90a0f5388586dd94510ab558c79d2676247c1836c5e60e53b049d191f9a062d94a55f731b
-
SSDEEP
98304:Y1TaaKocfVGFZbwmDhH7XYVNerS7zjA2F+7rfPb4L:oNKociZbRhUVtzMMuz4
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 12 4820 rundll32.exe 22 4820 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4820 rundll32.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 4820 set thread context of 4592 4820 rundll32.exe 94 PID 4820 set thread context of 1884 4820 rundll32.exe 96 PID 4820 set thread context of 2192 4820 rundll32.exe 97 PID 4820 set thread context of 4028 4820 rundll32.exe 98 PID 4820 set thread context of 4488 4820 rundll32.exe 99 PID 4820 set thread context of 1404 4820 rundll32.exe 100 PID 4820 set thread context of 1208 4820 rundll32.exe 101 PID 4820 set thread context of 2496 4820 rundll32.exe 102 PID 4820 set thread context of 4924 4820 rundll32.exe 103 PID 4820 set thread context of 4444 4820 rundll32.exe 104 PID 4820 set thread context of 4936 4820 rundll32.exe 105 PID 4820 set thread context of 1436 4820 rundll32.exe 106 PID 4820 set thread context of 1720 4820 rundll32.exe 107 PID 4820 set thread context of 2296 4820 rundll32.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4532 4240 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 25 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe 4820 rundll32.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 4592 rundll32.exe 1884 rundll32.exe 2192 rundll32.exe 4028 rundll32.exe 4488 rundll32.exe 1404 rundll32.exe 1208 rundll32.exe 2496 rundll32.exe 4924 rundll32.exe 4444 rundll32.exe 4936 rundll32.exe 1436 rundll32.exe 1720 rundll32.exe 2296 rundll32.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4820 4240 2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe 84 PID 4240 wrote to memory of 4820 4240 2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe 84 PID 4240 wrote to memory of 4820 4240 2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe 84 PID 4820 wrote to memory of 4592 4820 rundll32.exe 94 PID 4820 wrote to memory of 4592 4820 rundll32.exe 94 PID 4820 wrote to memory of 4592 4820 rundll32.exe 94 PID 4820 wrote to memory of 1884 4820 rundll32.exe 96 PID 4820 wrote to memory of 1884 4820 rundll32.exe 96 PID 4820 wrote to memory of 1884 4820 rundll32.exe 96 PID 4820 wrote to memory of 2192 4820 rundll32.exe 97 PID 4820 wrote to memory of 2192 4820 rundll32.exe 97 PID 4820 wrote to memory of 2192 4820 rundll32.exe 97 PID 4820 wrote to memory of 4028 4820 rundll32.exe 98 PID 4820 wrote to memory of 4028 4820 rundll32.exe 98 PID 4820 wrote to memory of 4028 4820 rundll32.exe 98 PID 4820 wrote to memory of 4488 4820 rundll32.exe 99 PID 4820 wrote to memory of 4488 4820 rundll32.exe 99 PID 4820 wrote to memory of 4488 4820 rundll32.exe 99 PID 4820 wrote to memory of 1404 4820 rundll32.exe 100 PID 4820 wrote to memory of 1404 4820 rundll32.exe 100 PID 4820 wrote to memory of 1404 4820 rundll32.exe 100 PID 4820 wrote to memory of 1208 4820 rundll32.exe 101 PID 4820 wrote to memory of 1208 4820 rundll32.exe 101 PID 4820 wrote to memory of 1208 4820 rundll32.exe 101 PID 4820 wrote to memory of 2496 4820 rundll32.exe 102 PID 4820 wrote to memory of 2496 4820 rundll32.exe 102 PID 4820 wrote to memory of 2496 4820 rundll32.exe 102 PID 4820 wrote to memory of 4924 4820 rundll32.exe 103 PID 4820 wrote to memory of 4924 4820 rundll32.exe 103 PID 4820 wrote to memory of 4924 4820 rundll32.exe 103 PID 4820 wrote to memory of 4444 4820 rundll32.exe 104 PID 4820 wrote to memory of 4444 4820 rundll32.exe 104 PID 4820 wrote to memory of 4444 4820 rundll32.exe 104 PID 4820 wrote to memory of 4936 4820 rundll32.exe 105 PID 4820 wrote to memory of 4936 4820 rundll32.exe 105 PID 4820 wrote to memory of 4936 4820 rundll32.exe 105 PID 4820 wrote to memory of 1436 4820 rundll32.exe 106 PID 4820 wrote to memory of 1436 4820 rundll32.exe 106 PID 4820 wrote to memory of 1436 4820 rundll32.exe 106 PID 4820 wrote to memory of 1720 4820 rundll32.exe 107 PID 4820 wrote to memory of 1720 4820 rundll32.exe 107 PID 4820 wrote to memory of 1720 4820 rundll32.exe 107 PID 4820 wrote to memory of 2296 4820 rundll32.exe 108 PID 4820 wrote to memory of 2296 4820 rundll32.exe 108 PID 4820 wrote to memory of 2296 4820 rundll32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe"C:\Users\Admin\AppData\Local\Temp\2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Fsofqh.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4592
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1884
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2192
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4028
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4488
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1404
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1208
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2496
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4924
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4444
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4936
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1436
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1720
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172543⤵
- Suspicious use of FindShellTrayWindow
PID:2296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 4162⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4240 -ip 42401⤵PID:1400
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5a210ba96b298f8bdd099e7353ff41c15
SHA191cbac372d640bae390dd00ec6109bab337481fe
SHA2567f7063ac03a3e4587cb91096e0cbe0c2ff269742ca6ed38449386d2e621dd37e
SHA51279c867776bb77743b755bb0041ef1236cdfd6bbd9c6dd431ee8e6dd06fd7ac3ba0a5a6d8f20d528a13f27246ee9c84be5bc28dc882514798cb26941a26892b37
-
Filesize
3.2MB
MD5a210ba96b298f8bdd099e7353ff41c15
SHA191cbac372d640bae390dd00ec6109bab337481fe
SHA2567f7063ac03a3e4587cb91096e0cbe0c2ff269742ca6ed38449386d2e621dd37e
SHA51279c867776bb77743b755bb0041ef1236cdfd6bbd9c6dd431ee8e6dd06fd7ac3ba0a5a6d8f20d528a13f27246ee9c84be5bc28dc882514798cb26941a26892b37
-
Filesize
55KB
MD59c4a61da174add27e0e3791bd6ae9aad
SHA11b69b1217ac6e80f13908214f03cfa5467755017
SHA256f2addf0c6b8f639a9fa9fcffc86a5d0d218539895e6fa5739e2af1ea5151804a
SHA5125aec95e1ef96acbc6131594caaa471a42b1090ab10833f2c868a374ea72906a9fffec31f96bdda17cc1fb02b24835a53df164fa96d935f220f52b5e3717cd94a
-
Filesize
11KB
MD53b9e9d2bd05c384f627fe9395b6f0d84
SHA1d665ab9ff3e25af2c678208f8d72c6e7477acbe0
SHA2560c4c3d40d664fd5410417a1c662ec817b2a36748976084be58a9894e61fc9d84
SHA5121c765a92ca377d78b063c85ae66df4eec35e805e8766227368a848e513fbcde6e2b53ec69b09df93ee09b4edd18d37375b72156584ea06459b9e77eea960acde
-
Filesize
11KB
MD507efde1a834de031adb24423dda467fa
SHA1f4187705864a3bde2ce299f18e9851dac8d8fc60
SHA2560b4aea52430de1420e46c7b7086d50244e787a6055eefe10e166e12a50158de3
SHA5127cff2c526382bf017d5d4912271faacc4a46c8725c7c0f4e62493009a9ad0a9410088bf761719d71f3c978d665db38db0b6058d7f2e2f34a5f8989d04829de65
-
Filesize
53KB
MD5365cf7efd4c39a4e0ce6bf1b8e83454c
SHA1f0f7e99651287e832601e2e75e5671ee01961b34
SHA25639255912b36f903bcaa07b06446528d210bd0204d7f3d0fd22ae35d1502a60d1
SHA5128fbf89ec61014f31961a37072d1e8e17c79a61df83780d184957be7e660d44ce23bf14962adb935eac85d2a2a96b035bd1589d64cbf01fc919b12133d3e34512
-
Filesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58
-
Filesize
697B
MD58699576660dca8bc750d4a28621acd02
SHA160007019529365df50fae860cc3e1c19ebfc353d
SHA256d07937c9d7acac7eaa4c7d22160a95dec6322240cc638f6be54f40992fc1e218
SHA512f723ebdd92d379faa26bd99ab4a8f6821dbefe2ded3d6ccfd97aa6302083f504424e7d253f41653f17a9c535d54921a2449807d7f3a9bf940b56ed3a015efb6a