Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
46c754bc3647321253189a73ac22d559.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
46c754bc3647321253189a73ac22d559.exe
Resource
win10v2004-20231215-en
General
-
Target
46c754bc3647321253189a73ac22d559.exe
-
Size
88KB
-
MD5
46c754bc3647321253189a73ac22d559
-
SHA1
040537cba7508e2b6ae01d05d782e791962f1788
-
SHA256
e3c29b13b412747f75654fe466d7c7a6a5b63087b971d1c922eeb9798b1fe61f
-
SHA512
c3fdbc1ae8be3792874dba69e3a7adb4a06a5d835fd8874365841346d5266ddebe0b65ccf5dda1c98fb87fc58d6714be62303517048b6d513cad677544a72c72
-
SSDEEP
1536:xjjJV8fBLXk0/shSdX5Y6ifBTeJ+XMwNfxE3ZOtspqlXBMrgK5aZQ0Gpn8nHyqOS:xXATQA5Y65+8w/E3ZOtKqlzypn8HyLq
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2128 rundll32.exe 1984 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qzoyojudoy = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Wineocs.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2128 2284 46c754bc3647321253189a73ac22d559.exe 19 PID 2284 wrote to memory of 2128 2284 46c754bc3647321253189a73ac22d559.exe 19 PID 2284 wrote to memory of 2128 2284 46c754bc3647321253189a73ac22d559.exe 19 PID 2128 wrote to memory of 1984 2128 rundll32.exe 103 PID 2128 wrote to memory of 1984 2128 rundll32.exe 103 PID 2128 wrote to memory of 1984 2128 rundll32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c754bc3647321253189a73ac22d559.exe"C:\Users\Admin\AppData\Local\Temp\46c754bc3647321253189a73ac22d559.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wineocs.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wineocs.dll",iep3⤵
- Loads dropped DLL
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e165f0c503846178a995abd53f4fecad
SHA1a8c2d9f98385e8d93f7fdf0e54ed9744e5b61318
SHA256e47367f1d0fae4789bfc71cfb762952b6f3aea27587628beb3816a360c716d72
SHA51233aa6a6bfed8be771315e55c856e5946705cb55fbbd30b9fe043430bb63f1ba6006f4dd9fca147e5ac4571cb87dc47fcfb5ebe8e62b41f946734ca838316a2a9