Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
683cc4e29bed1421a4524e3579d58bd6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
683cc4e29bed1421a4524e3579d58bd6.dll
Resource
win10v2004-20231215-en
General
-
Target
683cc4e29bed1421a4524e3579d58bd6.dll
-
Size
34KB
-
MD5
683cc4e29bed1421a4524e3579d58bd6
-
SHA1
10748bf254625dd22245ad603be82eb052db5638
-
SHA256
5a4def80e36a0b2e470b5e901ead4d4087457967e422cf5a0dd5b2d4b284dc90
-
SHA512
b7b16165f8446a5e5a317e65df52e7877b3e7b7cd528d787f02d43328d5da5a282ea04fad60e4313aa80516328d08d8c652544513d3d12e72d1576d302c4c3d6
-
SSDEEP
768:eiQQkZDTbBwI72tszyuwyrNJgYhyAM67Q5B6xqRv+N17kE7ukG:DQQkpXBwI72tszNwcMYsGqRa7ksuP
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1420 rundll32.exe 1420 rundll32.exe 2184 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\yayxurRH.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\yayxurRH.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\yayxurRH.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ = "C:\\Windows\\SysWow64\\yayxurRH.dll" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1420 rundll32.exe 1420 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1420 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1420 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1420 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4372 wrote to memory of 1420 4372 rundll32.exe 88 PID 4372 wrote to memory of 1420 4372 rundll32.exe 88 PID 4372 wrote to memory of 1420 4372 rundll32.exe 88 PID 1420 wrote to memory of 624 1420 rundll32.exe 3 PID 1420 wrote to memory of 2184 1420 rundll32.exe 100 PID 1420 wrote to memory of 2184 1420 rundll32.exe 100 PID 1420 wrote to memory of 2184 1420 rundll32.exe 100
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\683cc4e29bed1421a4524e3579d58bd6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\683cc4e29bed1421a4524e3579d58bd6.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\yayxurRH.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5683cc4e29bed1421a4524e3579d58bd6
SHA110748bf254625dd22245ad603be82eb052db5638
SHA2565a4def80e36a0b2e470b5e901ead4d4087457967e422cf5a0dd5b2d4b284dc90
SHA512b7b16165f8446a5e5a317e65df52e7877b3e7b7cd528d787f02d43328d5da5a282ea04fad60e4313aa80516328d08d8c652544513d3d12e72d1576d302c4c3d6