Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
0f5069dff53423ea4e5f591a4fe819ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f5069dff53423ea4e5f591a4fe819ed.exe
Resource
win10v2004-20231215-en
General
-
Target
0f5069dff53423ea4e5f591a4fe819ed.exe
-
Size
260KB
-
MD5
0f5069dff53423ea4e5f591a4fe819ed
-
SHA1
25e1f42b707a59da2b5d549f3ee123d32bc85895
-
SHA256
b6854965fab46c51a0350a8d9fb21f0797f872ae3e96198829306373d594dd71
-
SHA512
a59517cc900299cd352c281263780fc7126577b83b8600aac8af0cd99d1ee987dc6080c0a84a9d5b75cc92dc7446e2eba68a34b735b6d92d8c61684fc1f7951c
-
SSDEEP
3072:N1SIY9MlJpd157vzjjhy3SzSygCQjQqyH8GSI7jOExlUBgFqPQrXjA61u2+TKa69:GIUMLzLjI6OC3cPI7BqofNrfr/ncW
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\License\Parameters\ServiceDll = "C:\\Windows\\system32\\kubtz.dll" rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 3852 rundll2kxp.exe 3344 rundll2kxp.exe 4084 RUNDLL2KXP.EXE -
Loads dropped DLL 4 IoCs
pid Process 3852 rundll2kxp.exe 3344 rundll2kxp.exe 4084 RUNDLL2KXP.EXE 2064 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Program Files (x86)\\Common Files\\system\\Updaterun.exe" 0f5069dff53423ea4e5f591a4fe819ed.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll2kxp.exe 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Windows\SysWOW64\rundll2kxp.exe 0f5069dff53423ea4e5f591a4fe819ed.exe File created C:\Windows\SysWOW64\wbem\jedik.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\advport.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Windows\SysWOW64\wbem\jedik.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Windows\SysWOW64\ocmor.dll RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 RUNDLL2KXP.EXE File created C:\Windows\SysWOW64\advport.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Windows\SysWOW64\kubtz.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File created C:\Windows\SysWOW64\wbem\ocmor.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Windows\SysWOW64\wbem\ocmor.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\WINDOWS\SysWOW64\WBEM\ocmor.dll RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies RUNDLL2KXP.EXE File created C:\Windows\SysWOW64\kubtz.dll 0f5069dff53423ea4e5f591a4fe819ed.exe File created C:\Windows\SysWOW64\Score.txt RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 RUNDLL2KXP.EXE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\system\Updaterun.exe 0f5069dff53423ea4e5f591a4fe819ed.exe File opened for modification C:\Program Files (x86)\Common Files\system\Updaterun.exe 0f5069dff53423ea4e5f591a4fe819ed.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url5 = "http://www.3839.com/index.html" 0f5069dff53423ea4e5f591a4fe819ed.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix RUNDLL2KXP.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" RUNDLL2KXP.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" RUNDLL2KXP.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3852 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 91 PID 5100 wrote to memory of 3852 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 91 PID 5100 wrote to memory of 3852 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 91 PID 5100 wrote to memory of 3344 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 97 PID 5100 wrote to memory of 3344 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 97 PID 5100 wrote to memory of 3344 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 97 PID 5100 wrote to memory of 2064 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 99 PID 5100 wrote to memory of 2064 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 99 PID 5100 wrote to memory of 2064 5100 0f5069dff53423ea4e5f591a4fe819ed.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5069dff53423ea4e5f591a4fe819ed.exe"C:\Users\Admin\AppData\Local\Temp\0f5069dff53423ea4e5f591a4fe819ed.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll2kxp.exe"C:\Windows\system32\rundll2kxp.exe" "C:\Windows\system32\wbem\jedik.dll",Export @install2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3852
-
-
C:\Windows\SysWOW64\rundll2kxp.exe"C:\Windows\system32\rundll2kxp.exe" "C:\Windows\system32\wbem\jedik.dll",Export @start2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3344
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\kubtz.dll",ExportFunc 10012⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
PID:2064
-
-
C:\WINDOWS\SysWOW64\RUNDLL2KXP.EXEC:\WINDOWS\SysWOW64\RUNDLL2KXP.EXE C:\WINDOWS\SYSTEM32\WBEM\JEDIK.DLL,Export 10871⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52c9c3948edbbdb7015054eda23d1cca0
SHA114a6aa1d75dfdfc2fd213545f150c034b0f7286f
SHA256b75790e97df65e074970d9347148d60860328b91c6e0be08deacdc204b076fea
SHA51275c70cb432107b43e20f6df8dc9484deb60d0a4dd2bf7182686a56bc533aaf44862015f40a62d867224502a5a505611b4d90b5638cf86721fcca378098fa9e9b
-
Filesize
236KB
MD5728a36ea9080184e99b828c93a86781d
SHA125a71da5eeaf5d60a537b02620ce7a7a69773d81
SHA2566f55db12adb84c01dfae3f5357ed977a94c691850d0e171c45be6780220da677
SHA5123e7b1d97ee4eb8dcf9bfc4bc15d2405286ba4c709cb16870567caddeb6588f65bf977f15f1472b685fbbcf6c8c2906f75e60af1e3f02e04769567db865060618
-
Filesize
10KB
MD54936a6954ed59700a3c706f9094685ee
SHA1124edd171bfc8a5c7f5fcf2147f6ff43b705bb79
SHA256e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe
SHA5121ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea
-
Filesize
212KB
MD538c6fb661d99afc350099ec1282d7744
SHA1326f13d2ffc77214a3178f7d0246d73903a756ac
SHA256c3f362ce59f793eb7d55f407678bc6a883eb68932a513ad3bd6221f05800f2ad
SHA51261a8fbd5599c53371e33f6b3861c3e94cc7de553e1f640e25b1dc011b0a44250dd389ebe71d5880b9f10d06974bb89456283fce1d030ae15fda2b3777d014c89