Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2023, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe
Resource
win10v2004-20230220-en
General
-
Target
dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe
-
Size
3.4MB
-
MD5
1c88d1d6898565210e98d0029ea599cd
-
SHA1
993ca10e82c0207b33f0d90fd7c62a0cb662be02
-
SHA256
dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95
-
SHA512
8fe6ce390f98dfc6eb29dd8c51c6ff6cdf5097d7d6474437d7090dfb80a29f4c577c227305b2c186a53a38cbf2831a4cf5292427b0d6aab1900cb7b4f372aeed
-
SSDEEP
98304:BP982AzK03PdWf/i6UNPQBA96qRSv9UeZWgGA:BPXA+036i6UNP2A965bU
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 21 5000 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 5000 rundll32.exe 5000 rundll32.exe -
Suspicious use of SetThreadContext 19 IoCs
description pid Process procid_target PID 5000 set thread context of 1420 5000 rundll32.exe 93 PID 5000 set thread context of 4632 5000 rundll32.exe 95 PID 5000 set thread context of 224 5000 rundll32.exe 96 PID 5000 set thread context of 4368 5000 rundll32.exe 97 PID 5000 set thread context of 2704 5000 rundll32.exe 98 PID 5000 set thread context of 3472 5000 rundll32.exe 99 PID 5000 set thread context of 4964 5000 rundll32.exe 100 PID 5000 set thread context of 1256 5000 rundll32.exe 101 PID 5000 set thread context of 832 5000 rundll32.exe 102 PID 5000 set thread context of 4220 5000 rundll32.exe 103 PID 5000 set thread context of 4616 5000 rundll32.exe 104 PID 5000 set thread context of 3532 5000 rundll32.exe 105 PID 5000 set thread context of 5040 5000 rundll32.exe 106 PID 5000 set thread context of 1508 5000 rundll32.exe 107 PID 5000 set thread context of 4836 5000 rundll32.exe 108 PID 5000 set thread context of 1636 5000 rundll32.exe 109 PID 5000 set thread context of 1924 5000 rundll32.exe 110 PID 5000 set thread context of 2672 5000 rundll32.exe 111 PID 5000 set thread context of 4076 5000 rundll32.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3472 1548 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 1420 rundll32.exe 4632 rundll32.exe 224 rundll32.exe 4368 rundll32.exe 2704 rundll32.exe 3472 rundll32.exe 4964 rundll32.exe 1256 rundll32.exe 832 rundll32.exe 4220 rundll32.exe 4616 rundll32.exe 3532 rundll32.exe 5040 rundll32.exe 1508 rundll32.exe 4836 rundll32.exe 1636 rundll32.exe 1924 rundll32.exe 2672 rundll32.exe 4076 rundll32.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1548 wrote to memory of 5000 1548 dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe 87 PID 1548 wrote to memory of 5000 1548 dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe 87 PID 1548 wrote to memory of 5000 1548 dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe 87 PID 5000 wrote to memory of 1420 5000 rundll32.exe 93 PID 5000 wrote to memory of 1420 5000 rundll32.exe 93 PID 5000 wrote to memory of 1420 5000 rundll32.exe 93 PID 5000 wrote to memory of 4632 5000 rundll32.exe 95 PID 5000 wrote to memory of 4632 5000 rundll32.exe 95 PID 5000 wrote to memory of 4632 5000 rundll32.exe 95 PID 5000 wrote to memory of 224 5000 rundll32.exe 96 PID 5000 wrote to memory of 224 5000 rundll32.exe 96 PID 5000 wrote to memory of 224 5000 rundll32.exe 96 PID 5000 wrote to memory of 4368 5000 rundll32.exe 97 PID 5000 wrote to memory of 4368 5000 rundll32.exe 97 PID 5000 wrote to memory of 4368 5000 rundll32.exe 97 PID 5000 wrote to memory of 2704 5000 rundll32.exe 98 PID 5000 wrote to memory of 2704 5000 rundll32.exe 98 PID 5000 wrote to memory of 2704 5000 rundll32.exe 98 PID 5000 wrote to memory of 3472 5000 rundll32.exe 99 PID 5000 wrote to memory of 3472 5000 rundll32.exe 99 PID 5000 wrote to memory of 3472 5000 rundll32.exe 99 PID 5000 wrote to memory of 4964 5000 rundll32.exe 100 PID 5000 wrote to memory of 4964 5000 rundll32.exe 100 PID 5000 wrote to memory of 4964 5000 rundll32.exe 100 PID 5000 wrote to memory of 1256 5000 rundll32.exe 101 PID 5000 wrote to memory of 1256 5000 rundll32.exe 101 PID 5000 wrote to memory of 1256 5000 rundll32.exe 101 PID 5000 wrote to memory of 832 5000 rundll32.exe 102 PID 5000 wrote to memory of 832 5000 rundll32.exe 102 PID 5000 wrote to memory of 832 5000 rundll32.exe 102 PID 5000 wrote to memory of 4220 5000 rundll32.exe 103 PID 5000 wrote to memory of 4220 5000 rundll32.exe 103 PID 5000 wrote to memory of 4220 5000 rundll32.exe 103 PID 5000 wrote to memory of 4616 5000 rundll32.exe 104 PID 5000 wrote to memory of 4616 5000 rundll32.exe 104 PID 5000 wrote to memory of 4616 5000 rundll32.exe 104 PID 5000 wrote to memory of 3532 5000 rundll32.exe 105 PID 5000 wrote to memory of 3532 5000 rundll32.exe 105 PID 5000 wrote to memory of 3532 5000 rundll32.exe 105 PID 5000 wrote to memory of 5040 5000 rundll32.exe 106 PID 5000 wrote to memory of 5040 5000 rundll32.exe 106 PID 5000 wrote to memory of 5040 5000 rundll32.exe 106 PID 5000 wrote to memory of 1508 5000 rundll32.exe 107 PID 5000 wrote to memory of 1508 5000 rundll32.exe 107 PID 5000 wrote to memory of 1508 5000 rundll32.exe 107 PID 5000 wrote to memory of 4836 5000 rundll32.exe 108 PID 5000 wrote to memory of 4836 5000 rundll32.exe 108 PID 5000 wrote to memory of 4836 5000 rundll32.exe 108 PID 5000 wrote to memory of 1636 5000 rundll32.exe 109 PID 5000 wrote to memory of 1636 5000 rundll32.exe 109 PID 5000 wrote to memory of 1636 5000 rundll32.exe 109 PID 5000 wrote to memory of 1924 5000 rundll32.exe 110 PID 5000 wrote to memory of 1924 5000 rundll32.exe 110 PID 5000 wrote to memory of 1924 5000 rundll32.exe 110 PID 5000 wrote to memory of 2672 5000 rundll32.exe 111 PID 5000 wrote to memory of 2672 5000 rundll32.exe 111 PID 5000 wrote to memory of 2672 5000 rundll32.exe 111 PID 5000 wrote to memory of 4076 5000 rundll32.exe 112 PID 5000 wrote to memory of 4076 5000 rundll32.exe 112 PID 5000 wrote to memory of 4076 5000 rundll32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe"C:\Users\Admin\AppData\Local\Temp\dc42d929e9402f39102abeb6393c320db50d887401e5f24bdaa2d6a78c8c1d95.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Qioeifrhiweaeq.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1420
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4632
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:224
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4368
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2704
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3472
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4964
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1256
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:832
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4220
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4616
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3532
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5040
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1508
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4836
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1636
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1924
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2672
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 308563⤵
- Suspicious use of FindShellTrayWindow
PID:4076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 5602⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1548 -ip 15481⤵PID:3464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5857f799c3775fc191ee2b6ee8ee081ee
SHA126c2b9efb6b9b12429e4859d794283a297df1a5b
SHA2565c780e63810431a98b3c05c255f81bab209e12d669ee44f58ea222577af49acb
SHA5126d2caa68585bf032e14b2080a166f64626ead0926d84f8ef2f06d7046c944cc55916447de15ac06dc8d4c37f5b9f6272a778c28dd1111489de43bb13e3796063
-
Filesize
3.2MB
MD5857f799c3775fc191ee2b6ee8ee081ee
SHA126c2b9efb6b9b12429e4859d794283a297df1a5b
SHA2565c780e63810431a98b3c05c255f81bab209e12d669ee44f58ea222577af49acb
SHA5126d2caa68585bf032e14b2080a166f64626ead0926d84f8ef2f06d7046c944cc55916447de15ac06dc8d4c37f5b9f6272a778c28dd1111489de43bb13e3796063
-
Filesize
3.2MB
MD5857f799c3775fc191ee2b6ee8ee081ee
SHA126c2b9efb6b9b12429e4859d794283a297df1a5b
SHA2565c780e63810431a98b3c05c255f81bab209e12d669ee44f58ea222577af49acb
SHA5126d2caa68585bf032e14b2080a166f64626ead0926d84f8ef2f06d7046c944cc55916447de15ac06dc8d4c37f5b9f6272a778c28dd1111489de43bb13e3796063