Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
0324787dd433998606be301fff016041.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0324787dd433998606be301fff016041.dll
Resource
win10v2004-20231215-en
General
-
Target
0324787dd433998606be301fff016041.dll
-
Size
230KB
-
MD5
0324787dd433998606be301fff016041
-
SHA1
1c9a7bf60307ffd4192159da77be266684f9f927
-
SHA256
e27b9b450ac29718cd77475d1e2486ed458c9bcc4ff645daed0517575b446f46
-
SHA512
b3341f8b452de87085a58a70f1dbfc6cde385a315982198346c2cb489f510c8d32010282ba99cb21c3c8bf9cf1d1059bdb9b67257eed7ea04a70c76771974db4
-
SSDEEP
1536:mdEvyJnUuBWGc/GnYAN6DfD7m+xSchBSQ2Ks9mfWlivU258lwg/VGkGOwikleijy:iQyPWGcuYD7pFDkmvUEH8bwikwZ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vxh = "{f1b6ce7a-793e-ce83-8a4f-793e46f272d5}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2064 rundll32.exe 2064 rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\iku.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\iku.dll rundll32.exe File created C:\Windows\SysWOW64\uwg.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f1b6ce7a-793e-ce83-8a4f-793e46f272d5}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f1b6ce7a-793e-ce83-8a4f-793e46f272d5} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f1b6ce7a-793e-ce83-8a4f-793e46f272d5}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f1b6ce7a-793e-ce83-8a4f-793e46f272d5}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f1b6ce7a-793e-ce83-8a4f-793e46f272d5}\InprocServer32\ = "C:\\Windows\\SysWow64\\qsc.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2064 1080 rundll32.exe 19 PID 1080 wrote to memory of 2064 1080 rundll32.exe 19 PID 1080 wrote to memory of 2064 1080 rundll32.exe 19 PID 1080 wrote to memory of 2064 1080 rundll32.exe 19 PID 1080 wrote to memory of 2064 1080 rundll32.exe 19 PID 1080 wrote to memory of 2064 1080 rundll32.exe 19 PID 1080 wrote to memory of 2064 1080 rundll32.exe 19
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0324787dd433998606be301fff016041.dll,#11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2064
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0324787dd433998606be301fff016041.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD59fcd6a1744c4f217a9480315a461e5ea
SHA1e08bf3962c06a8e35550de086a1cd1da99449e1b
SHA256c2a90455993570d24504f48790f4009ac69c37395ae338130b96ff3a07e7b818
SHA512caed893c697064e688ad3eb1725667f62179f7fc5f439ea8779d311c24d8ae721dfce8458e3a54baecd90dd103a7d93c97db7d498572b4745dfbb599317ffd2a
-
Filesize
289KB
MD51c162682731a84ef4d3db32544da20c3
SHA16893bb119e8c70ee76ccbd3457d1391d1d0bc344
SHA2564ac82da7d0c70003e246ceec802765e0053c8c1a0e26ebb48da4818d4b8fe3bb
SHA51225114aa9f7e2d76e1fd96ef1e20cc341066b83653b55ca1e87ff0804da0599697db0e0026373bbf55cb6396b1512f4cef2791c68c6c18e845b4162ea31a555a0