Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
48d20d11a7ceaf25b91a53a78c8e12a6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48d20d11a7ceaf25b91a53a78c8e12a6.dll
Resource
win10v2004-20231215-en
General
-
Target
48d20d11a7ceaf25b91a53a78c8e12a6.dll
-
Size
1.0MB
-
MD5
48d20d11a7ceaf25b91a53a78c8e12a6
-
SHA1
656576d892bdf6b0705175813ff614b8e7f01995
-
SHA256
e0e993e5237760772fa7089f635e39d0f4406dc6ca4eba34d65999ea3bc3c7e3
-
SHA512
d2011ee2168cfcb1c066b526cf06d1b7647f3f3d610d69ca019003f07d6e40c73d0478571e8b84d2901d5cfea52879a35359460b3624fe5a05b6cb96f889fa38
-
SSDEEP
24576:jLMosPrXcqPy1A6wBjSxheLE3tkNUdssjFz:jLM5PrVP2ArjSjmct8ts
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3136 396 WerFault.exe 87 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1204 WINWORD.EXE 1204 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1204 WINWORD.EXE 1204 WINWORD.EXE 1204 WINWORD.EXE 1204 WINWORD.EXE 1204 WINWORD.EXE 1204 WINWORD.EXE 1204 WINWORD.EXE 1204 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3480 wrote to memory of 396 3480 rundll32.exe 87 PID 3480 wrote to memory of 396 3480 rundll32.exe 87 PID 3480 wrote to memory of 396 3480 rundll32.exe 87 PID 396 wrote to memory of 1204 396 rundll32.exe 92 PID 396 wrote to memory of 1204 396 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48d20d11a7ceaf25b91a53a78c8e12a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48d20d11a7ceaf25b91a53a78c8e12a6.dll,#12⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\办公室党支部2020年度工作总结(20200115).docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 11043⤵
- Program crash
PID:3136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 396 -ip 3961⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD55a73f073fcc0b6aaf9e11ba6f026f15f
SHA15a4aad50203cc1e1cb2be04fcdfe5f059e19b2e6
SHA256d965cdbea06bbf659254ae7c31f3122fd586716aae1784886bbc3af0e0ce2fd4
SHA5120ded2a7e9ccf53c8853ac2c9896f9e0c31725484ac6f5ad7edfeef97c0fa1baad7231a0ffee85c9225d30dff8f3960ed24b995e18fe484519002226445f39727