Analysis
-
max time kernel
117s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
0636d7a7f48c6287b95c43caae75b3b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0636d7a7f48c6287b95c43caae75b3b3.exe
Resource
win10v2004-20231215-en
General
-
Target
0636d7a7f48c6287b95c43caae75b3b3.exe
-
Size
78KB
-
MD5
0636d7a7f48c6287b95c43caae75b3b3
-
SHA1
682fbd783064907c5a5df2f38ff11ae5e0cc6608
-
SHA256
e58c6d9dc373b2c9d12807d48c2cefd72c4f7f5c675f57a39e876bc4fea6b1cb
-
SHA512
f422e8e2eabbabf5ca5c45bd215b1b2be9f14f1088892a2e9ef09e686f08ff56f89dd0b95edf7ed4a2d17575eb0784f65a11967634fe94ed45939100b28da03e
-
SSDEEP
1536:EpgpHzb9dZVX9fHMvG0D3XJgMW6Lwb62GEmrAxoDv5YBFTnJyt0phlsvODOx:ygXdZt9P6D3XJgMWm2GEmrAKD5YbzEWG
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2780 regsvr32.exe 2820 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\audioscdrv = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\audioscdrv\\audioscdrv.dll\", DllInit" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2660 wrote to memory of 2780 2660 0636d7a7f48c6287b95c43caae75b3b3.exe 29 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30 PID 2780 wrote to memory of 2820 2780 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0636d7a7f48c6287b95c43caae75b3b3.exe"C:\Users\Admin\AppData\Local\Temp\0636d7a7f48c6287b95c43caae75b3b3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /i /n /s "C:\Users\Admin\AppData\Local\Temp\audioperflibrary.dll"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\audioscdrv\audioscdrv.dll", DllInit3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5c92fabdd58fc7dfd05206ca226ba59ff
SHA140c594a2967b905fa6e76850b274ad8506241799
SHA2567aac7152076ad3f39045950ced9442f331ebd866e61e02a95081c0f0938023ac
SHA5125207c0ac7c96dd75d52f99031dc54c5c1fb7d3337625de24afd5b3d2bbf6a54c19642a51d2ea3091e478a768015152c9861d73a308c11ea01ccbb7b4ad05b307