Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07687584879a2904204d004bbfde8ace.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
07687584879a2904204d004bbfde8ace.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
07687584879a2904204d004bbfde8ace.dll
-
Size
29KB
-
MD5
07687584879a2904204d004bbfde8ace
-
SHA1
1167c96ab5cbca6b44e7c327a4e944aebd5fa125
-
SHA256
1c242601f7d3edf104af0ad82ac4af1b25567f1a48ecb0823f2aa0853930c8df
-
SHA512
8999e6f129a0a2f98ca1d4b46f962530b1f4ed4e3cf4ed0aa56d22e989276cedcd2392183fc902e8c6dbeaec7ba8fbea2ad106903bdf7848bb84bae26adbaaae
-
SSDEEP
768:NTYF6R9mdHaPwfZqxpfaaMN6WxGhbYUepC:NTYqwgxtMN6WxDUepC
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\wininet.dll = "dfrgsrv.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1984 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1984 1880 rundll32.exe 14 PID 1880 wrote to memory of 1984 1880 rundll32.exe 14 PID 1880 wrote to memory of 1984 1880 rundll32.exe 14 PID 1880 wrote to memory of 1984 1880 rundll32.exe 14 PID 1880 wrote to memory of 1984 1880 rundll32.exe 14 PID 1880 wrote to memory of 1984 1880 rundll32.exe 14 PID 1880 wrote to memory of 1984 1880 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07687584879a2904204d004bbfde8ace.dll,#11⤵
- Adds policy Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07687584879a2904204d004bbfde8ace.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1880