Analysis
-
max time kernel
147s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:11
Behavioral task
behavioral1
Sample
2979f7f46020a9286fe5110cd1c1a17e.dll
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2979f7f46020a9286fe5110cd1c1a17e.dll
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
2979f7f46020a9286fe5110cd1c1a17e.dll
-
Size
9KB
-
MD5
2979f7f46020a9286fe5110cd1c1a17e
-
SHA1
1ef25f870ec05c7c2095b2f2f8b6dbcb80138a86
-
SHA256
6b3213fa971a20810b03f02b1d64219802169e84463062c9f20bb8b756e4eff2
-
SHA512
bc2a7de1e7dcc295fc340e7a320840aec3cae165d7311f369b24c493f15978ea465907ffceee449f3be43d6d56daafc935dce38eae3a71b10682db6120b3a854
-
SSDEEP
192:rDOgKXdbztGac18nPGOKYSLsFWJkzuytDo6oNjDMIsK:nyXdbz0ac1+PG7Y0sAJkzufNvH5
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\odb_set = "{D54B7FFF-150A-4C58-8E1B-592042DB6C3D}" rundll32.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 12 3140 rundll32.exe -
resource yara_rule behavioral2/memory/3140-0-0x0000000010000000-0x000000001000A000-memory.dmp upx behavioral2/memory/3140-14-0x0000000010000000-0x000000001000A000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\odbcmr32.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\odbcmr32.dll rundll32.exe File created C:\Windows\SysWOW64\obdwk.sys rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D54B7FFF-150A-4C58-8E1B-592042DB6C3D} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D54B7FFF-150A-4C58-8E1B-592042DB6C3D}\InprocServer32\ = "odbcmr32.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D54B7FFF-150A-4C58-8E1B-592042DB6C3D}\InprocServer32 rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3140 4376 rundll32.exe 14 PID 4376 wrote to memory of 3140 4376 rundll32.exe 14 PID 4376 wrote to memory of 3140 4376 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2979f7f46020a9286fe5110cd1c1a17e.dll,#11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Blocklisted process makes network request
- Drops file in System32 directory
- Modifies registry class
PID:3140
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2979f7f46020a9286fe5110cd1c1a17e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4376