Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
05e35d35c8c24247e0c098fab4626222.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05e35d35c8c24247e0c098fab4626222.dll
Resource
win10v2004-20231215-en
General
-
Target
05e35d35c8c24247e0c098fab4626222.dll
-
Size
236KB
-
MD5
05e35d35c8c24247e0c098fab4626222
-
SHA1
f2b4210e435df8f338c6b4f7c586e26c5b50a1fe
-
SHA256
e46ad3f0f004b17192351015302239693bf290a311a32fbbbec25dfcb97cd967
-
SHA512
53667185b940afc90497f0bb3ec4fb5ef591dcdc56443856df12afca867bdd697f0ee930622dbc0518d76750ae107ab323b5b47b58996f98da99400599597e2a
-
SSDEEP
1536:1dKaTHN2ymZ0ofa5uQm4V7HG8ldINh+RhFtFftCgpcGO5lPf/XG8GmGwktbs:1Y4tIQG8XAmbFfaGc1fawk1s
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\iuc = "{206b85ff-a8e3-fd38-b9f4-a8e30d77c4ab}" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4620 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\vhp.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\vhp.dll rundll32.exe File created C:\Windows\SysWOW64\dpx.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\dpx.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{206b85ff-a8e3-fd38-b9f4-a8e30d77c4ab} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{206b85ff-a8e3-fd38-b9f4-a8e30d77c4ab}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{206b85ff-a8e3-fd38-b9f4-a8e30d77c4ab}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{206b85ff-a8e3-fd38-b9f4-a8e30d77c4ab}\InprocServer32\ = "C:\\Windows\\SysWow64\\dpx.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{206b85ff-a8e3-fd38-b9f4-a8e30d77c4ab}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4620 rundll32.exe 4620 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4620 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4620 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4620 3376 rundll32.exe 23 PID 3376 wrote to memory of 4620 3376 rundll32.exe 23 PID 3376 wrote to memory of 4620 3376 rundll32.exe 23
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05e35d35c8c24247e0c098fab4626222.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05e35d35c8c24247e0c098fab4626222.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5c1577305dc2649d36aa4fc88113b28a2
SHA18f3099e8cf1aaa3d9cc2b53f61ea08c949eac23c
SHA256f9aea565afc8bdcd5d824b6c10136c7a5de8e35bee51e5ac3b764e783f39755e
SHA512e659b9dba41ab8e841b3bf655a931906a064f699916027991193946b73c9723e315021b1b33a634b7b64ca469e0ad721bee314e8f0451c1d0c8583d4743d0197
-
Filesize
44KB
MD50cfdbe1c0b0fc3c2529ea8cce52ee1c6
SHA1ded9884ba3d64a95f023cf2608c334bb0af8b7a3
SHA2564332f3a7bf0ade8c8eb1248c77c0220349a1a4b0e9aa726a9473882c41be6c08
SHA5122cae8e609499778b9b9147e5be69a746b50f632d0fe31c275f0101d14d716f30e25291ba328352b8be4607667fbc78a9ae62fbe5cbc2ea7c88373af3325e1366