Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
24-06-2023 15:30
Behavioral task
behavioral1
Sample
cd1bb3e15e00395238f8f995f0f206bde69479d422c119517685fd009e951218.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
cd1bb3e15e00395238f8f995f0f206bde69479d422c119517685fd009e951218.dll
Resource
win10v2004-20230621-en
General
-
Target
cd1bb3e15e00395238f8f995f0f206bde69479d422c119517685fd009e951218.dll
-
Size
2.9MB
-
MD5
71c3d24af19ec09608dabf93f56e8c80
-
SHA1
3da1104b67c1509c27c1236369016594a0641048
-
SHA256
cd1bb3e15e00395238f8f995f0f206bde69479d422c119517685fd009e951218
-
SHA512
0043022ac9ba177b19c04105c55cb6c75ca0d1aeb3f029cd1afe1dfee196306d4f55b481523a22ec61ab889508117d37b1f08ae642da270f171f83e8b2296a5e
-
SSDEEP
49152:/q3jDLMcXShsmWF73/YqYAWysjU3BFFspj2xI8g7k/Y2idB+V:0vFSmlhYAWyssBFFAGInwidC
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 1 1336 rundll32.exe 2 1336 rundll32.exe 4 1336 rundll32.exe 5 1336 rundll32.exe 7 1336 rundll32.exe 9 1336 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ifconfig.me -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 856 wmic.exe Token: SeSecurityPrivilege 856 wmic.exe Token: SeTakeOwnershipPrivilege 856 wmic.exe Token: SeLoadDriverPrivilege 856 wmic.exe Token: SeSystemProfilePrivilege 856 wmic.exe Token: SeSystemtimePrivilege 856 wmic.exe Token: SeProfSingleProcessPrivilege 856 wmic.exe Token: SeIncBasePriorityPrivilege 856 wmic.exe Token: SeCreatePagefilePrivilege 856 wmic.exe Token: SeBackupPrivilege 856 wmic.exe Token: SeRestorePrivilege 856 wmic.exe Token: SeShutdownPrivilege 856 wmic.exe Token: SeDebugPrivilege 856 wmic.exe Token: SeSystemEnvironmentPrivilege 856 wmic.exe Token: SeRemoteShutdownPrivilege 856 wmic.exe Token: SeUndockPrivilege 856 wmic.exe Token: SeManageVolumePrivilege 856 wmic.exe Token: 33 856 wmic.exe Token: 34 856 wmic.exe Token: 35 856 wmic.exe Token: SeIncreaseQuotaPrivilege 856 wmic.exe Token: SeSecurityPrivilege 856 wmic.exe Token: SeTakeOwnershipPrivilege 856 wmic.exe Token: SeLoadDriverPrivilege 856 wmic.exe Token: SeSystemProfilePrivilege 856 wmic.exe Token: SeSystemtimePrivilege 856 wmic.exe Token: SeProfSingleProcessPrivilege 856 wmic.exe Token: SeIncBasePriorityPrivilege 856 wmic.exe Token: SeCreatePagefilePrivilege 856 wmic.exe Token: SeBackupPrivilege 856 wmic.exe Token: SeRestorePrivilege 856 wmic.exe Token: SeShutdownPrivilege 856 wmic.exe Token: SeDebugPrivilege 856 wmic.exe Token: SeSystemEnvironmentPrivilege 856 wmic.exe Token: SeRemoteShutdownPrivilege 856 wmic.exe Token: SeUndockPrivilege 856 wmic.exe Token: SeManageVolumePrivilege 856 wmic.exe Token: 33 856 wmic.exe Token: 34 856 wmic.exe Token: 35 856 wmic.exe Token: SeIncreaseQuotaPrivilege 1792 wmic.exe Token: SeSecurityPrivilege 1792 wmic.exe Token: SeTakeOwnershipPrivilege 1792 wmic.exe Token: SeLoadDriverPrivilege 1792 wmic.exe Token: SeSystemProfilePrivilege 1792 wmic.exe Token: SeSystemtimePrivilege 1792 wmic.exe Token: SeProfSingleProcessPrivilege 1792 wmic.exe Token: SeIncBasePriorityPrivilege 1792 wmic.exe Token: SeCreatePagefilePrivilege 1792 wmic.exe Token: SeBackupPrivilege 1792 wmic.exe Token: SeRestorePrivilege 1792 wmic.exe Token: SeShutdownPrivilege 1792 wmic.exe Token: SeDebugPrivilege 1792 wmic.exe Token: SeSystemEnvironmentPrivilege 1792 wmic.exe Token: SeRemoteShutdownPrivilege 1792 wmic.exe Token: SeUndockPrivilege 1792 wmic.exe Token: SeManageVolumePrivilege 1792 wmic.exe Token: 33 1792 wmic.exe Token: 34 1792 wmic.exe Token: 35 1792 wmic.exe Token: SeIncreaseQuotaPrivilege 1792 wmic.exe Token: SeSecurityPrivilege 1792 wmic.exe Token: SeTakeOwnershipPrivilege 1792 wmic.exe Token: SeLoadDriverPrivilege 1792 wmic.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 908 wrote to memory of 1336 908 rundll32.exe rundll32.exe PID 1336 wrote to memory of 856 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 856 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 856 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 856 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 1792 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 1792 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 1792 1336 rundll32.exe wmic.exe PID 1336 wrote to memory of 1792 1336 rundll32.exe wmic.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd1bb3e15e00395238f8f995f0f206bde69479d422c119517685fd009e951218.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd1bb3e15e00395238f8f995f0f206bde69479d422c119517685fd009e951218.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get processorid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792