Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
2bde107d9a6fd27ccf083002e5b39274.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2bde107d9a6fd27ccf083002e5b39274.dll
Resource
win10v2004-20231215-en
General
-
Target
2bde107d9a6fd27ccf083002e5b39274.dll
-
Size
70KB
-
MD5
2bde107d9a6fd27ccf083002e5b39274
-
SHA1
25ad845b35e590837c8c6ffacee885c54bdcbba0
-
SHA256
a21a97692e56aacc293cb5225edfcd1d658cc8e544bc54f97c9d81027cf66870
-
SHA512
3ded969e7a17cbfa285f587508f9c7303991d58332063ce453ccaca196eb5ef7ecd043221723e87b9988127116e4a83c526a7d1b76ab2e0cd8cc26fb3ac4809f
-
SSDEEP
768:okKpisvuzgdwMG9hl7c1M5uEcnZ99AOqpKznLp385BRCwBqcqZkwZEn4LZP:JKplSbm1rtAOe+n1MZCkqrZkkEn4Z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2492 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Alert Update Rpc Set..dll rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Alert Update Rpc Set..dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 3484 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe Token: SeDebugPrivilege 2492 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1960 4876 rundll32.exe 91 PID 4876 wrote to memory of 1960 4876 rundll32.exe 91 PID 4876 wrote to memory of 1960 4876 rundll32.exe 91 PID 1960 wrote to memory of 3484 1960 rundll32.exe 92 PID 1960 wrote to memory of 3484 1960 rundll32.exe 92 PID 1960 wrote to memory of 3484 1960 rundll32.exe 92 PID 1960 wrote to memory of 2492 1960 rundll32.exe 94 PID 1960 wrote to memory of 2492 1960 rundll32.exe 94 PID 1960 wrote to memory of 2492 1960 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bde107d9a6fd27ccf083002e5b39274.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bde107d9a6fd27ccf083002e5b39274.dll,#12⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s "C:\Users\Admin\AppData\Local\Temp\Alert Update Rpc Set.reg.reg"3⤵
- Runs .reg file with regedit
PID:3484
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\Common Files\Microsoft Shared\Alert Update Rpc Set..dll",polmxhat3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD52bde107d9a6fd27ccf083002e5b39274
SHA125ad845b35e590837c8c6ffacee885c54bdcbba0
SHA256a21a97692e56aacc293cb5225edfcd1d658cc8e544bc54f97c9d81027cf66870
SHA5123ded969e7a17cbfa285f587508f9c7303991d58332063ce453ccaca196eb5ef7ecd043221723e87b9988127116e4a83c526a7d1b76ab2e0cd8cc26fb3ac4809f