Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
158b5c92c38d7933d5264b5fd2d2a83d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
158b5c92c38d7933d5264b5fd2d2a83d.exe
Resource
win10v2004-20231215-en
General
-
Target
158b5c92c38d7933d5264b5fd2d2a83d.exe
-
Size
78KB
-
MD5
158b5c92c38d7933d5264b5fd2d2a83d
-
SHA1
4dcb5944ff4d8d3be822c98a77f92e043941e43d
-
SHA256
d3ae8cef984fa2b8dad2b566da020b7aaf2751255bb6b0833a2b99e7d9f538c2
-
SHA512
f9bff7fc967b718022a85b531f9c49334a8adcb6b7adda301ec83942de626e769f2ab93a7bacff75cd30df9d7e174d5129d3b9e69bf2fbbf719aa51558eb26b9
-
SSDEEP
1536:kLHk5SjT1qrBTTHA8mEYyEo6g2/TbULkYi45x+1IVXusi1s:oHYS+BvHANEpEo6g0/8kYB5xC+uh1
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 73 5056 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4184 rundll32.exe 5056 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ovepenoguquto = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\monDIN.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4184 4408 158b5c92c38d7933d5264b5fd2d2a83d.exe 89 PID 4408 wrote to memory of 4184 4408 158b5c92c38d7933d5264b5fd2d2a83d.exe 89 PID 4408 wrote to memory of 4184 4408 158b5c92c38d7933d5264b5fd2d2a83d.exe 89 PID 4184 wrote to memory of 5056 4184 rundll32.exe 101 PID 4184 wrote to memory of 5056 4184 rundll32.exe 101 PID 4184 wrote to memory of 5056 4184 rundll32.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\158b5c92c38d7933d5264b5fd2d2a83d.exe"C:\Users\Admin\AppData\Local\Temp\158b5c92c38d7933d5264b5fd2d2a83d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\monDIN.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\monDIN.dll",iep3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD500f07e2f521267cac01e7b2533da1fc5
SHA17936389a5e2c9a630cdd51e0beb5da585c40d850
SHA256fb795eaf8126a7485e95554f19226a84899faa1a9a2d8d2576deb36205aff92d
SHA5124648240e3671b670c645e36d57c769e2ad513247413991f4044b1aae3df39da2b3eb111508b8e4759df3bdfc5888fdecd95623434124f63b7e698bac4ba5fd56