Analysis
-
max time kernel
172s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 17:33
Static task
static1
Behavioral task
behavioral1
Sample
3aa509a9845a0f9e2a1f8c14f9543de7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3aa509a9845a0f9e2a1f8c14f9543de7.exe
Resource
win10v2004-20231215-en
General
-
Target
3aa509a9845a0f9e2a1f8c14f9543de7.exe
-
Size
108KB
-
MD5
3aa509a9845a0f9e2a1f8c14f9543de7
-
SHA1
7f308f5bbf0e190c902335c164832ad7bc398ef0
-
SHA256
f02fcfeecd8befe493b8c70ffcab2360a13f9d3f811db862452fe69ec37077c7
-
SHA512
b2236f3723142a9e21dade4b5968b2b3c60f3193fa0e9ea8f32e5bd5de8efe2bd9f9bbe92c5cb2c74670f789f8eb70084266db146420e9e88e6eb3d0a1e400e5
-
SSDEEP
3072:56Oji0kMPo3srsAPECcuu9WNRlJUqQa0SDl7W3:sOjEMw3kGCdnNR0S56
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2616 rundll32.exe 2852 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gyayajazet = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\wseralt.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4016 3aa509a9845a0f9e2a1f8c14f9543de7.exe 2616 rundll32.exe 2852 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4016 wrote to memory of 2616 4016 3aa509a9845a0f9e2a1f8c14f9543de7.exe 89 PID 4016 wrote to memory of 2616 4016 3aa509a9845a0f9e2a1f8c14f9543de7.exe 89 PID 4016 wrote to memory of 2616 4016 3aa509a9845a0f9e2a1f8c14f9543de7.exe 89 PID 2616 wrote to memory of 2852 2616 rundll32.exe 93 PID 2616 wrote to memory of 2852 2616 rundll32.exe 93 PID 2616 wrote to memory of 2852 2616 rundll32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa509a9845a0f9e2a1f8c14f9543de7.exe"C:\Users\Admin\AppData\Local\Temp\3aa509a9845a0f9e2a1f8c14f9543de7.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\wseralt.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\wseralt.dll",iep3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5c019bf4cea2170b9fa543d70d7c33f8b
SHA10da34a383f523d73c50bc8a6add9b958c68193d3
SHA256ca7a3eb22ee24d919ad94ed4934d71fd98e739fc8f958caaea867bd4d4393de8
SHA512cc9242d9d87d2ed1173d91f5d94573a2c5a49cfd02df55335ba669af558963a7988a7f631c556127ee2f9fa173cd679b89ac23e8085a1641a5a39b93a6a0f4d5