Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
c1be4671b4f67c1902f14a732f0ea283f90db889116ee1de310823ce12b04dda.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c1be4671b4f67c1902f14a732f0ea283f90db889116ee1de310823ce12b04dda.dll
Resource
win10v2004-20230703-en
General
-
Target
c1be4671b4f67c1902f14a732f0ea283f90db889116ee1de310823ce12b04dda.dll
-
Size
1.7MB
-
MD5
a8150e096396092c58f7bb78a7e1484f
-
SHA1
e30e8b92824a9e3f351e1fa1fb66fb27cb0a679d
-
SHA256
c1be4671b4f67c1902f14a732f0ea283f90db889116ee1de310823ce12b04dda
-
SHA512
a5dc461a0b4d8fc79d341ddcd2f8f68bce187fe67ff0303fd8605e83b7d7e2496094cf1d2175ee7e8effef84d159f11ac1ba28cef0dafdfacc632a8ef7c323fd
-
SSDEEP
49152:QXYLbix0dEDr+F46sPGiRPHKZ7WOLh7livfKYhiBWOh:QXYLWWCXfxPGihKZli5QWs
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 2248 rundll32.exe 3 2248 rundll32.exe 4 2248 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 22.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\D: rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\gpedit.msc mmc.exe File opened for modification C:\Windows\System32\GroupPolicy mmc.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main mmc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe 1908 22.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2424 mmc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2424 mmc.exe Token: SeIncBasePriorityPrivilege 2424 mmc.exe Token: 33 2424 mmc.exe Token: SeIncBasePriorityPrivilege 2424 mmc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 22.exe 1908 22.exe 2424 mmc.exe 2424 mmc.exe 2424 mmc.exe 2424 mmc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2584 wrote to memory of 2248 2584 rundll32.exe 28 PID 2248 wrote to memory of 1908 2248 rundll32.exe 31 PID 2248 wrote to memory of 1908 2248 rundll32.exe 31 PID 2248 wrote to memory of 1908 2248 rundll32.exe 31 PID 2248 wrote to memory of 1908 2248 rundll32.exe 31 PID 1908 wrote to memory of 2716 1908 22.exe 32 PID 1908 wrote to memory of 2716 1908 22.exe 32 PID 1908 wrote to memory of 2716 1908 22.exe 32 PID 1908 wrote to memory of 2716 1908 22.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1be4671b4f67c1902f14a732f0ea283f90db889116ee1de310823ce12b04dda.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1be4671b4f67c1902f14a732f0ea283f90db889116ee1de310823ce12b04dda.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Public\Music\22.exeC:\Users\Public\Music\22.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\ProgramData\MonkeyKing4⤵PID:2716
-
-
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\gpedit.msc"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD548c30975186d1e0e8e3f9b29b7d98321
SHA1dd0ad4e37b44c70204b64cb75adb0f937130105b
SHA2565aa75d506a8a0b066b402f9548e21c1f2b90c34facc0c38c651e382aa312ae54
SHA512559a77befe73b420a7f490b615f1ad1477a998b5a79f8e786dbc6cc691d8e09d7f6bd852f2f58feec5786367869339c787b28e1397fceb1f9fe83b378cfe107c
-
Filesize
108KB
MD548c30975186d1e0e8e3f9b29b7d98321
SHA1dd0ad4e37b44c70204b64cb75adb0f937130105b
SHA2565aa75d506a8a0b066b402f9548e21c1f2b90c34facc0c38c651e382aa312ae54
SHA512559a77befe73b420a7f490b615f1ad1477a998b5a79f8e786dbc6cc691d8e09d7f6bd852f2f58feec5786367869339c787b28e1397fceb1f9fe83b378cfe107c