Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 02:31
Static task
static1
Behavioral task
behavioral1
Sample
0010d605a2b60643537771dd074b5c2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0010d605a2b60643537771dd074b5c2a.exe
Resource
win10v2004-20231215-en
General
-
Target
0010d605a2b60643537771dd074b5c2a.exe
-
Size
41KB
-
MD5
0010d605a2b60643537771dd074b5c2a
-
SHA1
5708a81e0913b25cdb54533b7dc2624d7f406970
-
SHA256
eaf16c83903d08dec85e36e209ecce8d7f42336ba3ee4cc7ac7cbe3babb58584
-
SHA512
9b6affd23630e1c780fb153287ed759e2b5ece115f09503590b2e22a3f7ad2254b40b4011eb8719392b99ca81b4e366f972382ddf527ec88ec7afdb77fcc13d8
-
SSDEEP
768:mizpD3PghHbXpP9+3A/Cmmco1eaCxH9l+8cDqIKn5iqJ87Mi:mizpDgvPUQK/coB69l5KO5iqJcMi
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1648 rundll32.exe 2116 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gnotakokoxevo = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\tfbcrc32.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3684 wrote to memory of 1648 3684 0010d605a2b60643537771dd074b5c2a.exe 34 PID 3684 wrote to memory of 1648 3684 0010d605a2b60643537771dd074b5c2a.exe 34 PID 3684 wrote to memory of 1648 3684 0010d605a2b60643537771dd074b5c2a.exe 34 PID 1648 wrote to memory of 2116 1648 rundll32.exe 99 PID 1648 wrote to memory of 2116 1648 rundll32.exe 99 PID 1648 wrote to memory of 2116 1648 rundll32.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0010d605a2b60643537771dd074b5c2a.exe"C:\Users\Admin\AppData\Local\Temp\0010d605a2b60643537771dd074b5c2a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\tfbcrc32.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\tfbcrc32.dll",iep3⤵
- Loads dropped DLL
PID:2116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5abfe5f228c93cdb44125500b4427fa0d
SHA1fc0d4f60ee8e129f9b3f08ba1bcd2470050ad83b
SHA2564a68a858b7757b42de26ff102f753f397edd7de13c19f71c0208d26e42ffa3ae
SHA5129c14c94fd283b07b24dc7e548ac6164d25ff116aa0696317dd19c797ff3f2fb7bc42909682316d77718baa215b285dd327d5ec0528752871b8896d2dddda7801