Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 07:25
Behavioral task
behavioral1
Sample
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll
Resource
win10v2004-20230831-en
General
-
Target
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll
-
Size
2.9MB
-
MD5
f6a3de7e8b71cb93960bc23556a24e04
-
SHA1
af7bd878e6a3145209031b66f9f438ef191d24e9
-
SHA256
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22
-
SHA512
bfdbe9efb6d252a0da7e62545f0b68a44bcf073f40fdbc492ebbef8c2f03406bac89feeff23b3dfa85f69961205bb1cb9a891047a99b03a199f2076e2b0838e1
-
SSDEEP
49152:/q3jDLMcXShsmWF73/JJYyLOlXm12KcW43dtDgvboZpA8LOkK+v8LIoWw7p0C+V:0vFSmlhYy6W0DrDgkPakK+toWw+
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2188 rundll32.exe 4 2188 rundll32.exe 6 2188 rundll32.exe 8 2188 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ifconfig.me -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3060 wmic.exe Token: SeSecurityPrivilege 3060 wmic.exe Token: SeTakeOwnershipPrivilege 3060 wmic.exe Token: SeLoadDriverPrivilege 3060 wmic.exe Token: SeSystemProfilePrivilege 3060 wmic.exe Token: SeSystemtimePrivilege 3060 wmic.exe Token: SeProfSingleProcessPrivilege 3060 wmic.exe Token: SeIncBasePriorityPrivilege 3060 wmic.exe Token: SeCreatePagefilePrivilege 3060 wmic.exe Token: SeBackupPrivilege 3060 wmic.exe Token: SeRestorePrivilege 3060 wmic.exe Token: SeShutdownPrivilege 3060 wmic.exe Token: SeDebugPrivilege 3060 wmic.exe Token: SeSystemEnvironmentPrivilege 3060 wmic.exe Token: SeRemoteShutdownPrivilege 3060 wmic.exe Token: SeUndockPrivilege 3060 wmic.exe Token: SeManageVolumePrivilege 3060 wmic.exe Token: 33 3060 wmic.exe Token: 34 3060 wmic.exe Token: 35 3060 wmic.exe Token: SeIncreaseQuotaPrivilege 3060 wmic.exe Token: SeSecurityPrivilege 3060 wmic.exe Token: SeTakeOwnershipPrivilege 3060 wmic.exe Token: SeLoadDriverPrivilege 3060 wmic.exe Token: SeSystemProfilePrivilege 3060 wmic.exe Token: SeSystemtimePrivilege 3060 wmic.exe Token: SeProfSingleProcessPrivilege 3060 wmic.exe Token: SeIncBasePriorityPrivilege 3060 wmic.exe Token: SeCreatePagefilePrivilege 3060 wmic.exe Token: SeBackupPrivilege 3060 wmic.exe Token: SeRestorePrivilege 3060 wmic.exe Token: SeShutdownPrivilege 3060 wmic.exe Token: SeDebugPrivilege 3060 wmic.exe Token: SeSystemEnvironmentPrivilege 3060 wmic.exe Token: SeRemoteShutdownPrivilege 3060 wmic.exe Token: SeUndockPrivilege 3060 wmic.exe Token: SeManageVolumePrivilege 3060 wmic.exe Token: 33 3060 wmic.exe Token: 34 3060 wmic.exe Token: 35 3060 wmic.exe Token: SeIncreaseQuotaPrivilege 2648 wmic.exe Token: SeSecurityPrivilege 2648 wmic.exe Token: SeTakeOwnershipPrivilege 2648 wmic.exe Token: SeLoadDriverPrivilege 2648 wmic.exe Token: SeSystemProfilePrivilege 2648 wmic.exe Token: SeSystemtimePrivilege 2648 wmic.exe Token: SeProfSingleProcessPrivilege 2648 wmic.exe Token: SeIncBasePriorityPrivilege 2648 wmic.exe Token: SeCreatePagefilePrivilege 2648 wmic.exe Token: SeBackupPrivilege 2648 wmic.exe Token: SeRestorePrivilege 2648 wmic.exe Token: SeShutdownPrivilege 2648 wmic.exe Token: SeDebugPrivilege 2648 wmic.exe Token: SeSystemEnvironmentPrivilege 2648 wmic.exe Token: SeRemoteShutdownPrivilege 2648 wmic.exe Token: SeUndockPrivilege 2648 wmic.exe Token: SeManageVolumePrivilege 2648 wmic.exe Token: 33 2648 wmic.exe Token: 34 2648 wmic.exe Token: 35 2648 wmic.exe Token: SeIncreaseQuotaPrivilege 2648 wmic.exe Token: SeSecurityPrivilege 2648 wmic.exe Token: SeTakeOwnershipPrivilege 2648 wmic.exe Token: SeLoadDriverPrivilege 2648 wmic.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2268 wrote to memory of 2188 2268 rundll32.exe 28 PID 2188 wrote to memory of 3060 2188 rundll32.exe 29 PID 2188 wrote to memory of 3060 2188 rundll32.exe 29 PID 2188 wrote to memory of 3060 2188 rundll32.exe 29 PID 2188 wrote to memory of 3060 2188 rundll32.exe 29 PID 2188 wrote to memory of 2648 2188 rundll32.exe 32 PID 2188 wrote to memory of 2648 2188 rundll32.exe 32 PID 2188 wrote to memory of 2648 2188 rundll32.exe 32 PID 2188 wrote to memory of 2648 2188 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get processorid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-