Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0db680950a45d004285ef5db16c4e5cb.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0db680950a45d004285ef5db16c4e5cb.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0db680950a45d004285ef5db16c4e5cb.dll
-
Size
51KB
-
MD5
0db680950a45d004285ef5db16c4e5cb
-
SHA1
a3bc2248a69c8080a5c267936d9a0ce3a97180a9
-
SHA256
a59cc82c8655e6e3cf3e5127dda2754afedec66e7f056c0d40c8f75e1be4956c
-
SHA512
412a63878540f8a0ea437667d4a3a0b2484ee6d0973091ed384dc0ed99754f5f9addac0384194eaf8f7629df07aa73c3ce19778ab9f831a8017434379d11840c
-
SSDEEP
1536:Jt+JXI/TS6X2cb+IZgxjYfhDibxQ1jDhPpiY0XHEe:Jt2I/u6X2cb+Iz1jVIXk
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",C:\\Windows\\system32\\ntnids32.exe" rundll32.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 4548 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4548 3272 rundll32.exe 16 PID 3272 wrote to memory of 4548 3272 rundll32.exe 16 PID 3272 wrote to memory of 4548 3272 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0db680950a45d004285ef5db16c4e5cb.dll,#11⤵
- Modifies WinLogon for persistence
- Blocklisted process makes network request
PID:4548
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0db680950a45d004285ef5db16c4e5cb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3272