Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
3c5c8f8427ab0f784310b7a3302de88c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c5c8f8427ab0f784310b7a3302de88c.dll
Resource
win10v2004-20231222-en
General
-
Target
3c5c8f8427ab0f784310b7a3302de88c.dll
-
Size
36KB
-
MD5
3c5c8f8427ab0f784310b7a3302de88c
-
SHA1
7fad7076010eecbd13be3b96e7e5e98030216893
-
SHA256
04f91317aa572a074a55f0cd1e54bb3c8dc7b8ae048698fb23c83d193759e341
-
SHA512
e0d9229989d721a0737994fb8b225cc6c7fd54aefbe2f30ba79f9b0275dd9ca69494d0da0e29228c658fbb677a85a6aadda5da40e8c7617364a2df54d7fcd811
-
SSDEEP
768:SjgiGxy+iC146BDRK97J3+ZFWo2iU+DIt8:yMy+hQYFWuIt8
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "regedit.exe /s \"%1\"" rundll32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3012 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 rundll32.exe 2540 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2028 wrote to memory of 2540 2028 rundll32.exe 14 PID 2540 wrote to memory of 1876 2540 rundll32.exe 17 PID 2540 wrote to memory of 1876 2540 rundll32.exe 17 PID 2540 wrote to memory of 1876 2540 rundll32.exe 17 PID 2540 wrote to memory of 1876 2540 rundll32.exe 17 PID 1876 wrote to memory of 3012 1876 cmd.exe 16 PID 1876 wrote to memory of 3012 1876 cmd.exe 16 PID 1876 wrote to memory of 3012 1876 cmd.exe 16 PID 1876 wrote to memory of 3012 1876 cmd.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c5c8f8427ab0f784310b7a3302de88c.dll,#11⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a.reg2⤵
- Suspicious use of WriteProcessMemory
PID:1876
-
-
C:\Windows\SysWOW64\regedit.exe"regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\a.reg"1⤵
- Runs .reg file with regedit
PID:3012
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c5c8f8427ab0f784310b7a3302de88c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b100f5324ef74ded0b998e64d07a2e19
SHA140b0d7f51bf2dd8451f1b723d21355c471a5fa46
SHA2563db613d24a75ae220891698c055e1c580a42e58564f568a0510db87581cc2042
SHA512c12391bb37c334074f7d7e1257b6364fd5cbce848e0a8fe15b8326f54fd9568fe3baec58618c4334027a774a06a08ec249cb71db925c1f85feee6a3d3a816c04