Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.dll
Resource
win10v2004-20230915-en
General
-
Target
2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.dll
-
Size
718KB
-
MD5
f0ab2cdb0cc00ced9270d4683208ed9d
-
SHA1
a83e4da5e37358484dd15f15bd11f08fabd8cfd4
-
SHA256
2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b
-
SHA512
0d33604ff8127bed4d71793612b3bbe63f57363e065d9db00e3af30d7b50d735a5d56f6ab756c606b6a46af25b14764178e88f4c9469a86118c1b04a29b8fe9f
-
SSDEEP
12288:OKOSiNUVwirGXBmEuvg2BiH7xQ3lCqHgIdeKmwGMmEaYOEi7i:O3bUyxVuI2BGG3lPHgIdeKmwGMmEaYO
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.dll" regsvr32.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.IA-32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\FolderExtensions\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\FolderExtensions\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\DriveMask = "255" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D17F1E1A-5919-4427-8F89-A1A8503CA3EB} regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2788 svchost.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2212128c8756738a67ce7b712480cb554e8cb81b11cdfb26a138a2c345abc61b.dll1⤵
- Registers COM server for autorun
- Modifies registry class
PID:3060
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2788