Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 17:05
Static task
static1
Behavioral task
behavioral1
Sample
4f9fa61a76fd02b904f57d327fc80f71.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4f9fa61a76fd02b904f57d327fc80f71.dll
Resource
win10v2004-20231023-en
General
-
Target
4f9fa61a76fd02b904f57d327fc80f71.dll
-
Size
617KB
-
MD5
4f9fa61a76fd02b904f57d327fc80f71
-
SHA1
bd7d98a305d294e89505c5cbf5c692a0201c9f16
-
SHA256
f8036b4993d07ca0d117b299c9111370cfbb01c69da2ee831d8064c7f0da899e
-
SHA512
f379f49d8d5b1b00af3b8225f438d16b00a465ff8742087a35e26363e1829abb62996fd10df9a1eb58793d5f23ae37bc1cea6e875d24633af69c1f7aefd06434
-
SSDEEP
12288:T/cYjwx7s0zXoBA5ozd6IDqk0MzkC4sEEqtQGfbjcED/l6ZCJj:oYMx7s07h5ozdDntzTPEEVGfbjRD/l64
Malware Config
Signatures
-
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 4988 net.exe 3300 net.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4164 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3452 systeminfo.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\CLSID\{13278D29-7CCB-CDAF-1B02-19B603662B95} regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\CLSID\{13278D29-7CCB-CDAF-1B02-19B603662B95}\ = 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 regsvr32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4556 regsvr32.exe 4556 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2888 WMIC.exe Token: SeSecurityPrivilege 2888 WMIC.exe Token: SeTakeOwnershipPrivilege 2888 WMIC.exe Token: SeLoadDriverPrivilege 2888 WMIC.exe Token: SeSystemProfilePrivilege 2888 WMIC.exe Token: SeSystemtimePrivilege 2888 WMIC.exe Token: SeProfSingleProcessPrivilege 2888 WMIC.exe Token: SeIncBasePriorityPrivilege 2888 WMIC.exe Token: SeCreatePagefilePrivilege 2888 WMIC.exe Token: SeBackupPrivilege 2888 WMIC.exe Token: SeRestorePrivilege 2888 WMIC.exe Token: SeShutdownPrivilege 2888 WMIC.exe Token: SeDebugPrivilege 2888 WMIC.exe Token: SeSystemEnvironmentPrivilege 2888 WMIC.exe Token: SeRemoteShutdownPrivilege 2888 WMIC.exe Token: SeUndockPrivilege 2888 WMIC.exe Token: SeManageVolumePrivilege 2888 WMIC.exe Token: 33 2888 WMIC.exe Token: 34 2888 WMIC.exe Token: 35 2888 WMIC.exe Token: 36 2888 WMIC.exe Token: SeIncreaseQuotaPrivilege 2888 WMIC.exe Token: SeSecurityPrivilege 2888 WMIC.exe Token: SeTakeOwnershipPrivilege 2888 WMIC.exe Token: SeLoadDriverPrivilege 2888 WMIC.exe Token: SeSystemProfilePrivilege 2888 WMIC.exe Token: SeSystemtimePrivilege 2888 WMIC.exe Token: SeProfSingleProcessPrivilege 2888 WMIC.exe Token: SeIncBasePriorityPrivilege 2888 WMIC.exe Token: SeCreatePagefilePrivilege 2888 WMIC.exe Token: SeBackupPrivilege 2888 WMIC.exe Token: SeRestorePrivilege 2888 WMIC.exe Token: SeShutdownPrivilege 2888 WMIC.exe Token: SeDebugPrivilege 2888 WMIC.exe Token: SeSystemEnvironmentPrivilege 2888 WMIC.exe Token: SeRemoteShutdownPrivilege 2888 WMIC.exe Token: SeUndockPrivilege 2888 WMIC.exe Token: SeManageVolumePrivilege 2888 WMIC.exe Token: 33 2888 WMIC.exe Token: 34 2888 WMIC.exe Token: 35 2888 WMIC.exe Token: 36 2888 WMIC.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1036 4556 regsvr32.exe 104 PID 4556 wrote to memory of 1036 4556 regsvr32.exe 104 PID 1036 wrote to memory of 1696 1036 cmd.exe 106 PID 1036 wrote to memory of 1696 1036 cmd.exe 106 PID 4556 wrote to memory of 2888 4556 regsvr32.exe 107 PID 4556 wrote to memory of 2888 4556 regsvr32.exe 107 PID 4556 wrote to memory of 4164 4556 regsvr32.exe 109 PID 4556 wrote to memory of 4164 4556 regsvr32.exe 109 PID 4556 wrote to memory of 3452 4556 regsvr32.exe 111 PID 4556 wrote to memory of 3452 4556 regsvr32.exe 111 PID 4556 wrote to memory of 4548 4556 regsvr32.exe 115 PID 4556 wrote to memory of 4548 4556 regsvr32.exe 115 PID 4548 wrote to memory of 2408 4548 net.exe 117 PID 4548 wrote to memory of 2408 4548 net.exe 117 PID 4556 wrote to memory of 4516 4556 regsvr32.exe 118 PID 4556 wrote to memory of 4516 4556 regsvr32.exe 118 PID 4556 wrote to memory of 4492 4556 regsvr32.exe 120 PID 4556 wrote to memory of 4492 4556 regsvr32.exe 120 PID 4556 wrote to memory of 4988 4556 regsvr32.exe 122 PID 4556 wrote to memory of 4988 4556 regsvr32.exe 122 PID 4556 wrote to memory of 3300 4556 regsvr32.exe 124 PID 4556 wrote to memory of 3300 4556 regsvr32.exe 124 PID 4556 wrote to memory of 232 4556 regsvr32.exe 126 PID 4556 wrote to memory of 232 4556 regsvr32.exe 126 PID 232 wrote to memory of 1412 232 net.exe 128 PID 232 wrote to memory of 1412 232 net.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4f9fa61a76fd02b904f57d327fc80f71.dll1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\system32\cmd.execmd.exe /c chcp >&22⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\chcp.comchcp3⤵PID:1696
-
-
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
PID:4164
-
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:3452
-
-
C:\Windows\system32\net.exenet config workstation2⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation3⤵PID:2408
-
-
-
C:\Windows\system32\nltest.exenltest /domain_trusts2⤵PID:4516
-
-
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts2⤵PID:4492
-
-
C:\Windows\system32\net.exenet view /all /domain2⤵
- Discovers systems in the same network
PID:4988
-
-
C:\Windows\system32\net.exenet view /all2⤵
- Discovers systems in the same network
PID:3300
-
-
C:\Windows\system32\net.exenet group "Domain Admins" /domain2⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group "Domain Admins" /domain3⤵PID:1412
-
-