Analysis
-
max time kernel
139s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 11:36
Behavioral task
behavioral1
Sample
_abvtsr4_F.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
_abvtsr4_F.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
_abvtsr4_F.ia.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
_abvtsr4_F.ia.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
_abvtsr4_F.mdat.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
_abvtsr4_F.mdat.dll
Resource
win10v2004-20230703-en
General
-
Target
_abvtsr4_F.ia.dll
-
Size
66.9MB
-
MD5
1735da610291af50447c1639fa773e8f
-
SHA1
45a3fcd4a1825ea016be63bdbd75341c0bc34d2e
-
SHA256
884fa59a4f7e52d7cafedb3f2db2301b88dc247a27fb58e5cd1475341606c124
-
SHA512
f26a9f54ac9650b3222eec593de510ebc150f241ead9ee48174956f4425f5a59ac369a1d41e33f4429b6f41961a8cfbc14727170de3ef2c5be7e89e6fbc7e8b9
-
SSDEEP
196608:Zh6D1KZpeSFfeE4RL953hFfLDW1XGrnWh:QsZ59eE4753PLnrWh
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/2952-0-0x0000000070D50000-0x0000000075054000-memory.dmp themida behavioral4/memory/2952-1-0x0000000070D50000-0x0000000075054000-memory.dmp themida behavioral4/memory/2952-2-0x0000000070D50000-0x0000000075054000-memory.dmp themida behavioral4/memory/2952-3-0x0000000070D50000-0x0000000075054000-memory.dmp themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3968 2952 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2952 rundll32.exe Token: 33 2952 rundll32.exe Token: SeIncBasePriorityPrivilege 2952 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2952 4524 rundll32.exe 81 PID 4524 wrote to memory of 2952 4524 rundll32.exe 81 PID 4524 wrote to memory of 2952 4524 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\_abvtsr4_F.ia.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\_abvtsr4_F.ia.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 10443⤵
- Program crash
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2952 -ip 29521⤵PID:4868