Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
25f8953a733a3d5bf8a2d56b12969122.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25f8953a733a3d5bf8a2d56b12969122.dll
Resource
win10v2004-20231215-en
General
-
Target
25f8953a733a3d5bf8a2d56b12969122.dll
-
Size
236KB
-
MD5
25f8953a733a3d5bf8a2d56b12969122
-
SHA1
210143e5660a2d5e33a31d6023d3d10c141fa395
-
SHA256
25ee8fff4e91d9742d4e2656b2f7b87e9477c352cfcda7e7af42b490bbd01505
-
SHA512
790186f36f508e7cf8592375d5dc297dfeaee58dad0931d9869cefb6a312bc17b036c5560e16e7349bf7e873fa623b2bedbbcc1ea9ed8de2826855fb53f3c01e
-
SSDEEP
3072:SeqmgHwlaazN9U3J+P0wFp+bLrt2wkkIx:+Qj9U3jwO3rt5a
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ueg = "{ca4d57dd-42c5-971a-53d6-42c5df556315}" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hrt.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\hrt.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ca4d57dd-42c5-971a-53d6-42c5df556315}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ca4d57dd-42c5-971a-53d6-42c5df556315} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ca4d57dd-42c5-971a-53d6-42c5df556315}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ca4d57dd-42c5-971a-53d6-42c5df556315}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ca4d57dd-42c5-971a-53d6-42c5df556315}\InprocServer32\ = "C:\\Windows\\SysWow64\\pzb.dll" rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1948 1452 rundll32.exe 28 PID 1452 wrote to memory of 1948 1452 rundll32.exe 28 PID 1452 wrote to memory of 1948 1452 rundll32.exe 28 PID 1452 wrote to memory of 1948 1452 rundll32.exe 28 PID 1452 wrote to memory of 1948 1452 rundll32.exe 28 PID 1452 wrote to memory of 1948 1452 rundll32.exe 28 PID 1452 wrote to memory of 1948 1452 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25f8953a733a3d5bf8a2d56b12969122.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25f8953a733a3d5bf8a2d56b12969122.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5343d2ba10b5b4bbd616a4775d551082c
SHA19a93bf9baf65f45d7f3b1e65eacb393ea24d091c
SHA2569d37ac2d48a17ff6776e09e2042860af2a286bb9a6509abc00926393a4e822bf
SHA512141a3455cc788472a89f8bc40387634cd04ea4f786519acd94e0ba536dfa2c3e4f4f50748b05b3bd92c92744ea0ed31e6a8ba335dcfe46f1bdf8421ec03f2e7f