Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 02:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f5063ebea6b207a464d14059f40d5e6.dll
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f5063ebea6b207a464d14059f40d5e6.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
4f5063ebea6b207a464d14059f40d5e6.dll
-
Size
224KB
-
MD5
4f5063ebea6b207a464d14059f40d5e6
-
SHA1
21e128c601096993c11dd4eb089a6461519e2f8c
-
SHA256
de4b5248a042c78c6a8756039dfc2c61ebe10c13bf3a114f4a5e9e18353bc6f6
-
SHA512
22da20074b345b441df581cf9ee1ef0999b971424d0fe3fa5e0e66359430d157c580eaf8d9e6669d566bcbefc5d8ce3db65e40fd6df15048506dded10ac367f4
-
SSDEEP
3072:JFEo69XHiOMh1iji3KFDtvvAHpI+RpmednfpW7Vjuu/zZt3k+U:MxYSDwHuGfQRjuurLk
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\mgxfebsq = "{91A26B21-F9A8-41A7-B94F-8907BA546937}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91A26B21-F9A8-41A7-B94F-8907BA546937} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91A26B21-F9A8-41A7-B94F-8907BA546937}\InProcServer32\ = "C:\\Windows\\mgxfebsq.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91A26B21-F9A8-41A7-B94F-8907BA546937}\InProcServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2416 2152 rundll32.exe 27 PID 2152 wrote to memory of 2416 2152 rundll32.exe 27 PID 2152 wrote to memory of 2416 2152 rundll32.exe 27 PID 2152 wrote to memory of 2416 2152 rundll32.exe 27 PID 2152 wrote to memory of 2416 2152 rundll32.exe 27 PID 2152 wrote to memory of 2416 2152 rundll32.exe 27 PID 2152 wrote to memory of 2416 2152 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f5063ebea6b207a464d14059f40d5e6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f5063ebea6b207a464d14059f40d5e6.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2416
-