Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 16:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4972d0c91d1557e19dd23f3bd04d0860.dll
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4972d0c91d1557e19dd23f3bd04d0860.dll
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
4972d0c91d1557e19dd23f3bd04d0860.dll
-
Size
220KB
-
MD5
4972d0c91d1557e19dd23f3bd04d0860
-
SHA1
525bede59326660741d7341b3e426f9ad412c182
-
SHA256
1253a9fbc54f9dc6cfff28350ae4ea37a7969bc9b0ef9e6b70edfbe5e4b1ae56
-
SHA512
79abc40ed3ab5ec27bbde7a996f700401bdd4a926a2d570f9bc85335a44ed86d5313e28378434f1347688555abc1427fd1fd7a04de85bed946ee5b3b512bcbf8
-
SSDEEP
3072:zBTAkIz55aySsJ+zwobRx4nPfuQAYqN1SlwKzsOkxr8m2h6t3XxnU:jcnvq84zxr8d4BU
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vregfwlx = "{0DAF6F63-C43F-4F1F-BE69-21386DD93394}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0DAF6F63-C43F-4F1F-BE69-21386DD93394} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0DAF6F63-C43F-4F1F-BE69-21386DD93394}\InProcServer32\ = "C:\\Windows\\vregfwlx.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0DAF6F63-C43F-4F1F-BE69-21386DD93394}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4828 4700 rundll32.exe 16 PID 4700 wrote to memory of 4828 4700 rundll32.exe 16 PID 4700 wrote to memory of 4828 4700 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4972d0c91d1557e19dd23f3bd04d0860.dll,#11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4828
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4972d0c91d1557e19dd23f3bd04d0860.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4700