Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:25
Behavioral task
behavioral1
Sample
7c7fac9d9844e4187a7604b401c704f2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c7fac9d9844e4187a7604b401c704f2.dll
Resource
win10v2004-20231215-en
Errors
General
-
Target
7c7fac9d9844e4187a7604b401c704f2.dll
-
Size
199KB
-
MD5
7c7fac9d9844e4187a7604b401c704f2
-
SHA1
25a60ce75daabedcddeb69f04abd4ab7928f7a65
-
SHA256
8f5906862b335c411cfcc94e428b16d8ea6cfbc0d384979181885261812ed913
-
SHA512
508508e2d0181991960727342a6e4cc1ad8da615dcb4f78b09f7ec0b27ab29f14a911a7971b7508e1fa65156a27201886d4419f63eac5335bb8d4590fdeade9d
-
SSDEEP
3072:eCdY0SWTzufHxnWDOvMWy5qWmAeq0XlFUQC+r20OEZsF5A:7O0JToxncpmDFUQlKEWM
Malware Config
Signatures
-
Modifies Shared Task Scheduler registry keys 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{CEDE2188-484C-B239-A68E-DC1B84001001} = "7c7fac9d9844e4187a7604b401c704f2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{CEDE2188-484C-B239-A68E-DC1B84001001} = "rfrqtrdmhdxx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{CEDE2188-484C-B239-A68E-DC1B84001001} = "7c7fac9d9844" regsvr32.exe -
Loads dropped DLL 2 IoCs
pid Process 2984 regsvr32.exe 8 regsvr32.exe -
resource yara_rule behavioral2/memory/1368-0-0x0000000002160000-0x0000000002193000-memory.dmp upx behavioral2/memory/8-10-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1368-12-0x0000000002160000-0x0000000002193000-memory.dmp upx behavioral2/memory/2984-11-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/files/0x001100000002315e-9.dat upx behavioral2/memory/2984-5-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/files/0x000300000001f45f-4.dat upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rfrqtrdmhdxx.dll regsvr32.exe File created C:\Windows\SysWOW64\rfrqtrdmhdxx.dll regsvr32.exe File opened for modification C:\Windows\SysWOW64\7c7fac9d9844.dll regsvr32.exe File created C:\Windows\SysWOW64\7c7fac9d9844.dll regsvr32.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "24" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7c7fac9d9844e4187a7604b401c704f2.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32\ = "C:\\Windows\\SysWow64\\rfrqtrdmhdxx.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\ = "C:\\Windows\\SysWow64\\7c7fac9d9844.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32\ = "C:\\Windows\\SysWow64\\7c7fac9d9844.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7c7fac9d9844e4187a7604b401c704f2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\ = "C:\\Windows\\SysWow64\\rfrqtrdmhdxx.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CEDE2188-484C-B239-A68E-DC1B84001001}\InprocServer32 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 8 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1368 4812 regsvr32.exe 17 PID 4812 wrote to memory of 1368 4812 regsvr32.exe 17 PID 4812 wrote to memory of 1368 4812 regsvr32.exe 17 PID 1368 wrote to memory of 2984 1368 regsvr32.exe 26 PID 1368 wrote to memory of 2984 1368 regsvr32.exe 26 PID 1368 wrote to memory of 2984 1368 regsvr32.exe 26 PID 2984 wrote to memory of 8 2984 regsvr32.exe 21 PID 2984 wrote to memory of 8 2984 regsvr32.exe 21 PID 2984 wrote to memory of 8 2984 regsvr32.exe 21
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7c7fac9d9844e4187a7604b401c704f2.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7c7fac9d9844e4187a7604b401c704f2.dll2⤵
- Modifies Shared Task Scheduler registry keys
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe C:\Windows\system32\rfrqtrdmhdxx.dll /s3⤵
- Modifies Shared Task Scheduler registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984
-
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe C:\Windows\system32\7c7fac9d9844.dll /s1⤵
- Modifies Shared Task Scheduler registry keys
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:8
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39bc055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD57c7fac9d9844e4187a7604b401c704f2
SHA125a60ce75daabedcddeb69f04abd4ab7928f7a65
SHA2568f5906862b335c411cfcc94e428b16d8ea6cfbc0d384979181885261812ed913
SHA512508508e2d0181991960727342a6e4cc1ad8da615dcb4f78b09f7ec0b27ab29f14a911a7971b7508e1fa65156a27201886d4419f63eac5335bb8d4590fdeade9d
-
Filesize
199KB
MD582c72cc48afd424049e8a1f1ebafa583
SHA13fbef8880e585ed611a30f8262b43bf7ecfaa9aa
SHA2568d977b11ab73482288570871f966bda184a751dec7caa08876bf948fcd52e8c4
SHA512096e41a76fb241b022c8d79a0db3e74cff7c36f22a757a53e800dad0b0c0abac1eddda09005f3b490482d8fe45cb28ad9a2d55eeea371dcef2b99c013f856f3b