Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll
Resource
win10v2004-20230703-en
General
-
Target
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll
-
Size
908KB
-
MD5
d663ebb9947ea39d2004a7fa6e8d79ca
-
SHA1
1fbdbe294fdb4aaa56ec93716abb2060195723c4
-
SHA256
b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d
-
SHA512
4b25c84958b67e5fe235881b534f5ea6d7017d1b53572ff734f5eeac4fb09bbac77c16960165f9225d95ee64e1e222ec53d665fa7295751d75a7b8c0522b1c16
-
SSDEEP
24576:GHcgLiNmJ7FWqxxixsJrJ5WRJlqvHbNAx:Cc0igBsIrJ5SqWx
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 5 2936 rundll32.exe 15 2936 rundll32.exe 22 2936 rundll32.exe 24 2936 rundll32.exe 26 2936 rundll32.exe 29 2936 rundll32.exe 38 2936 rundll32.exe 39 2936 rundll32.exe 40 2936 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5100 2936 WerFault.exe 81 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 412 WINWORD.EXE 412 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 412 WINWORD.EXE 412 WINWORD.EXE 412 WINWORD.EXE 412 WINWORD.EXE 412 WINWORD.EXE 412 WINWORD.EXE 412 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2936 wrote to memory of 412 2936 rundll32.exe 82 PID 2936 wrote to memory of 412 2936 rundll32.exe 82 -
cURL User-Agent 9 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 26 curl/8.0.1-DEV HTTP User-Agent header 29 curl/8.0.1-DEV HTTP User-Agent header 39 curl/8.0.1-DEV HTTP User-Agent header 24 curl/8.0.1-DEV HTTP User-Agent header 38 curl/8.0.1-DEV HTTP User-Agent header 40 curl/8.0.1-DEV HTTP User-Agent header 5 curl/8.0.1-DEV HTTP User-Agent header 15 curl/8.0.1-DEV HTTP User-Agent header 22 curl/8.0.1-DEV
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7d67a09e35031ce5260b4ee614ed83c18dc57c7625178dc6e689e0aa4f65f6d.dll,#11⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Public\downloads\关于2023年3季度个人通信费报销工作的通知.docx" /o ""2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:412
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2936 -s 11202⤵
- Program crash
PID:5100
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 2936 -ip 29361⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5604839b85b4f3067dd581dc8227943a6
SHA1dcd9a131ed39a695742c46c3d89cd5537ea7ddf6
SHA256fac4ccbd72e7121472d0a5dafdbea65d23ce8ccdb49a3c01c1fa5cf56d02fb31
SHA5120935c765de15ba48c0cd7555ed3758657848ee6bc5e5011667d7854093cb91ac6ac60a8575288784998aa926bf5614fc83caeed777fb738c5a16138f996a5c7d
-
Filesize
500B
MD5604839b85b4f3067dd581dc8227943a6
SHA1dcd9a131ed39a695742c46c3d89cd5537ea7ddf6
SHA256fac4ccbd72e7121472d0a5dafdbea65d23ce8ccdb49a3c01c1fa5cf56d02fb31
SHA5120935c765de15ba48c0cd7555ed3758657848ee6bc5e5011667d7854093cb91ac6ac60a8575288784998aa926bf5614fc83caeed777fb738c5a16138f996a5c7d