Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
1ea293b23b51d93c3e5ba80297fb5831.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ea293b23b51d93c3e5ba80297fb5831.dll
Resource
win10v2004-20231215-en
General
-
Target
1ea293b23b51d93c3e5ba80297fb5831.dll
-
Size
46KB
-
MD5
1ea293b23b51d93c3e5ba80297fb5831
-
SHA1
c4162d05254f497d64aca559e4a89ec061277391
-
SHA256
e26efa5c6ccc17f25f591d98038b62313b1f3efa21f50046806e8f2d546491eb
-
SHA512
cf6389b414ae64d8e471d38ea7d20cf38b6863c38593d086ed0985163682ecb8f1c45744d269164846adffe0033e107fd0b982776dd7f057201799040d0a078d
-
SSDEEP
768:ZwqaIrF1RCMfz2H/kCfc2RAGkufmGnfeoqALacwF6pw+suOnti2xVbPX77N8tUk:BnR1/YkFsLkuuqfer87LOn82Xbvm
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LocalService\Parameters\ServiceDll = "C:\\Windows\\system32\\Local.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4324 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Local.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\Local.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 1892 4084 rundll32.exe 14 PID 4084 wrote to memory of 1892 4084 rundll32.exe 14 PID 4084 wrote to memory of 1892 4084 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ea293b23b51d93c3e5ba80297fb5831.dll,#11⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:1892
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ea293b23b51d93c3e5ba80297fb5831.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4084
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD51ea293b23b51d93c3e5ba80297fb5831
SHA1c4162d05254f497d64aca559e4a89ec061277391
SHA256e26efa5c6ccc17f25f591d98038b62313b1f3efa21f50046806e8f2d546491eb
SHA512cf6389b414ae64d8e471d38ea7d20cf38b6863c38593d086ed0985163682ecb8f1c45744d269164846adffe0033e107fd0b982776dd7f057201799040d0a078d
-
Filesize
19KB
MD5c0c3390f8b0cdf933af04fbb7561792f
SHA15b342c9d475a5553be10e4c5685aaab7bc008a30
SHA2564d3c7f32de16dc6a94ed65b9c04b916f94b9cc92e623ee4a3260d1cd4ed20227
SHA51208a46b8f3ec3391a0e424c2cb274e2d4e0d1c0a8ceab6bf4ad906575e9ae3417bcaa7ca7074064a2339e875cc91b5a1f6d421d48ee96622493b9dd90567e54c9