Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
3488a8c46e54c2075d2cb417f6e9ae79.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3488a8c46e54c2075d2cb417f6e9ae79.dll
Resource
win10v2004-20231215-en
General
-
Target
3488a8c46e54c2075d2cb417f6e9ae79.dll
-
Size
160KB
-
MD5
3488a8c46e54c2075d2cb417f6e9ae79
-
SHA1
f58cdc06d51a4a2b25184c3ec9a247b97a930f5a
-
SHA256
3da31cc9dba462a8f1c0375c8209051ab9a1eb7c46c7bca5b9c9a535569eee8d
-
SHA512
8812c71bc31b381c5b1731871a25d3331c4d123a82544c9ffce8ea3c57d2fc0799b68b81c5faf94e2054124bf6bcfd87a983c236f011815b872ac4462fcbc0c1
-
SSDEEP
3072:W0wpqFegLt9a46GT40hAzJLD2ZWd/0JyxiyFr:W0RFegLtjMA2FD8Wd/0Uxr
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LmHots\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\Services\\Com.txt" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Services\Com.txt rundll32.exe File created C:\Program Files (x86)\Common Files\Services\Com.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1844 rundll32.exe 1844 rundll32.exe 2508 svchost.exe 2508 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeCreateGlobalPrivilege 1844 rundll32.exe Token: SeCreateGlobalPrivilege 2508 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 764 wrote to memory of 1844 764 rundll32.exe 87 PID 764 wrote to memory of 1844 764 rundll32.exe 87 PID 764 wrote to memory of 1844 764 rundll32.exe 87 PID 1844 wrote to memory of 4640 1844 rundll32.exe 92 PID 1844 wrote to memory of 4640 1844 rundll32.exe 92 PID 1844 wrote to memory of 4640 1844 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3488a8c46e54c2075d2cb417f6e9ae79.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3488a8c46e54c2075d2cb417f6e9ae79.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\240630000.BaT3⤵PID:4640
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LmHots -s LmHots1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD53488a8c46e54c2075d2cb417f6e9ae79
SHA1f58cdc06d51a4a2b25184c3ec9a247b97a930f5a
SHA2563da31cc9dba462a8f1c0375c8209051ab9a1eb7c46c7bca5b9c9a535569eee8d
SHA5128812c71bc31b381c5b1731871a25d3331c4d123a82544c9ffce8ea3c57d2fc0799b68b81c5faf94e2054124bf6bcfd87a983c236f011815b872ac4462fcbc0c1
-
Filesize
250B
MD5a83d2c1ad0a87fc72d9fa86c7f7d1888
SHA10e484bed1ba2dd54d27b8ff3e351db33544b80bb
SHA256c96c15c1e17a79d1479160434fa237ad72e46974c31bb7720228fc5fd249abdd
SHA512c19ba7e19b147db6d3fd9a6e980e21b7813afe6c8e84b68562463b8fac23a881d374d757ef809da1ee84da37b4caa35140fb2a8215d8a4e8db25c4e907812bdf