Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe
Resource
win10v2004-20230621-en
General
-
Target
3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe
-
Size
830KB
-
MD5
00914f35c787428b08ce3709595b8017
-
SHA1
744537a4d8bc22572fbc1037d9b8d3b37149b4a4
-
SHA256
3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d
-
SHA512
80d4b1c3e3481525aedbf5f490a3a27085a0f32d1efa891a7ec86667afaad70a6acb99a6c5a6987d234c3ebb37454676529e70f6d91da2c4ec95d8ffc14da458
-
SSDEEP
24576:dtOQUbxzMqSutsraXV8ZemvhOqWlvhAfjTC86naEas0X:dtOrxznSgsuwvhEGenvas0X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 rundl123.exe -
Loads dropped DLL 1 IoCs
pid Process 1996 3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundl123.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundl123.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\AutoEndTasks rundl123.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\38.181.24.91:1150 rundl123.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe 2016 rundl123.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1996 3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe 2016 rundl123.exe 2016 rundl123.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2016 1996 3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe 28 PID 1996 wrote to memory of 2016 1996 3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe 28 PID 1996 wrote to memory of 2016 1996 3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe 28 PID 1996 wrote to memory of 2016 1996 3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe"C:\Users\Admin\AppData\Local\Temp\3a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\ProgramData\rundl123.exe"c:\ProgramData\rundl123.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD500914f35c787428b08ce3709595b8017
SHA1744537a4d8bc22572fbc1037d9b8d3b37149b4a4
SHA2563a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d
SHA51280d4b1c3e3481525aedbf5f490a3a27085a0f32d1efa891a7ec86667afaad70a6acb99a6c5a6987d234c3ebb37454676529e70f6d91da2c4ec95d8ffc14da458
-
Filesize
830KB
MD500914f35c787428b08ce3709595b8017
SHA1744537a4d8bc22572fbc1037d9b8d3b37149b4a4
SHA2563a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d
SHA51280d4b1c3e3481525aedbf5f490a3a27085a0f32d1efa891a7ec86667afaad70a6acb99a6c5a6987d234c3ebb37454676529e70f6d91da2c4ec95d8ffc14da458
-
Filesize
830KB
MD500914f35c787428b08ce3709595b8017
SHA1744537a4d8bc22572fbc1037d9b8d3b37149b4a4
SHA2563a304507c5be084e1dba1d471b9c065c316a6e1da4f8e2462fb25dc333f8a09d
SHA51280d4b1c3e3481525aedbf5f490a3a27085a0f32d1efa891a7ec86667afaad70a6acb99a6c5a6987d234c3ebb37454676529e70f6d91da2c4ec95d8ffc14da458