Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
069d63e1abea95c46a8a7d4c3063a6bb.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
069d63e1abea95c46a8a7d4c3063a6bb.dll
Resource
win10v2004-20231215-en
General
-
Target
069d63e1abea95c46a8a7d4c3063a6bb.dll
-
Size
231KB
-
MD5
069d63e1abea95c46a8a7d4c3063a6bb
-
SHA1
309654bc975e274c634df8329089676352e5d503
-
SHA256
92fae3faa43110e279f6e37cde54712afbdb495467c173ed7c39ce19b089a499
-
SHA512
ca084db4a36147e37e6529921141bb6ef59783c083c45f31ed74c45733f2611abe07b3baacaeb568964d378deaa4cb963ccbbdd9ec9bac87d84f1a57710d1292
-
SSDEEP
3072:zysX0WxnWd/IkmL+PViEbmzwtz/wk8YWbh:mskd/IkmuVfyWdMh
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\tspuu = "{161c8123-9e94-e3e9-afa5-9e9409abc82e}" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4184 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\gfchh.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\gfchh.dll rundll32.exe File created C:\Windows\SysWOW64\onkpp.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\onkpp.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161c8123-9e94-e3e9-afa5-9e9409abc82e}\InprocServer32\ = "C:\\Windows\\SysWow64\\onkpp.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161c8123-9e94-e3e9-afa5-9e9409abc82e}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161c8123-9e94-e3e9-afa5-9e9409abc82e} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161c8123-9e94-e3e9-afa5-9e9409abc82e}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{161c8123-9e94-e3e9-afa5-9e9409abc82e}\InprocServer32 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4184 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4184 1176 rundll32.exe 16 PID 1176 wrote to memory of 4184 1176 rundll32.exe 16 PID 1176 wrote to memory of 4184 1176 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\069d63e1abea95c46a8a7d4c3063a6bb.dll,#11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4184
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\069d63e1abea95c46a8a7d4c3063a6bb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
844B
MD526c637bde3aeb736c8a78f2050101e9b
SHA1021402a1dcf4ad22d0ac4d18808105a1440cacc8
SHA2562fc87c189df3b7877f7b55c1ae1991dec988966d725d90f47b19542ffc5f7a12
SHA51268e5ed973d1bcb64f845d4763b6636ce7d90ae19a70ebf295a3f35b7508efe659b711d81f8d7f8cf97048c65aef48c38f127a83b1d6a17fd3b5685d7499b3478