Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 06:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
458741d581bc5b7f1b4d1299c6b5389f.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
458741d581bc5b7f1b4d1299c6b5389f.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
458741d581bc5b7f1b4d1299c6b5389f.dll
-
Size
116KB
-
MD5
458741d581bc5b7f1b4d1299c6b5389f
-
SHA1
4f9271e26a6b7de5058f995fe6ea61a408594805
-
SHA256
cc03848a4549861a4c40e4cca8856ef8fe8525987a5c100f7e4668bda984809d
-
SHA512
99b31fee192af294fd472c50fca8f6edc9886f70226bd2a6ba9f04853cfc8697ef9d8182dcf81a71137d0b2536a60f4a5e38fd476fc9408a4bdd755de9a9506b
-
SSDEEP
3072:e49bhTizc8ocLJ55VzdRl4o/zFGdewQ90qU1Ddqb/RH:e49bF25bzBz/EdeSjDu5
Score
6/10
Malware Config
Signatures
-
Modifies WinLogon 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\458741d581bc5b7f1b4d1299c6b5389f\Startup = "WlxStartupEvent" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\458741d581bc5b7f1b4d1299c6b5389f\Shutdown = "WlxShutdownEvent" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\458741d581bc5b7f1b4d1299c6b5389f\Impersonate = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\458741d581bc5b7f1b4d1299c6b5389f\Asynchronous = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\458741d581bc5b7f1b4d1299c6b5389f rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\458741d581bc5b7f1b4d1299c6b5389f\DllName = "C:\\Users\\Admin\\AppData\\Local\\Temp\\458741d581bc5b7f1b4d1299c6b5389f.dll" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctl3pack.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1800 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1800 2504 rundll32.exe 28 PID 2504 wrote to memory of 1800 2504 rundll32.exe 28 PID 2504 wrote to memory of 1800 2504 rundll32.exe 28 PID 2504 wrote to memory of 1800 2504 rundll32.exe 28 PID 2504 wrote to memory of 1800 2504 rundll32.exe 28 PID 2504 wrote to memory of 1800 2504 rundll32.exe 28 PID 2504 wrote to memory of 1800 2504 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\458741d581bc5b7f1b4d1299c6b5389f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\458741d581bc5b7f1b4d1299c6b5389f.dll,#12⤵
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1800
-