Analysis
-
max time kernel
164s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 19:20
Behavioral task
behavioral1
Sample
36f0e4ed75a4cbbe79b1a7105bbb3995.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f0e4ed75a4cbbe79b1a7105bbb3995.exe
Resource
win10v2004-20231215-en
General
-
Target
36f0e4ed75a4cbbe79b1a7105bbb3995.exe
-
Size
13KB
-
MD5
36f0e4ed75a4cbbe79b1a7105bbb3995
-
SHA1
f9c8792aa1d0544a41effe50d0c33378bd977a5c
-
SHA256
1d0799de8e01ed4b223ed6e00d6e51cf8fcfc3142b9b794a901fb9baa3b4ecda
-
SHA512
c19fd65c087d2946f4045535dc21ed52e9e8fc15b049479d1af00207558c010e9d5921e5765bb3136d9d1e982cecc4cfadb0db4b10705be4d8e8586a54dcb47d
-
SSDEEP
192:m51V1upEMYREAW6tHwK1igssEcX4jXv+quAOhWEUmJA0B/CPd1jjkEp0hq:U/EA11MpXvagqkbjjkk0Q
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rundll32.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2348 rundll32.exe -
Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\SharedTaskScheduler\{786C369D-409A-456f-A13C-971EADA850C6} = "DertertDE" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
Loads dropped DLL 4 IoCs
pid Process 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ = "C:\\Windows\\SysWow64\\birdasfihuy32.dll" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ThreadingModel = "Apartment" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2304-9-0x0000000000400000-0x000000000040F000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\birdasfihuy32.dll 36f0e4ed75a4cbbe79b1a7105bbb3995.exe File created C:\Windows\SysWOW64\biasfardihuy.dll 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\SOFTWARE\Microsoft\Internet Explorer\Security rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Security\sox_id = "456253522821" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Security rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Security\rpt = "6594" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Security\sox_ver = "0" rundll32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6} 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ = "C:\\Windows\\SysWow64\\birdasfihuy32.dll" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ThreadingModel = "Apartment" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Wow6432Node\CLSID 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27 PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27 PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27 PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27 PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27 PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27 PID 2304 wrote to memory of 2348 2304 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f0e4ed75a4cbbe79b1a7105bbb3995.exe"C:\Users\Admin\AppData\Local\Temp\36f0e4ed75a4cbbe79b1a7105bbb3995.exe"1⤵
- Modifies Shared Task Scheduler registry keys
- Registers COM server for autorun
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\birdasfihuy32.dll, load2⤵
- Modifies security service
- Windows security bypass
- Blocklisted process makes network request
- Loads dropped DLL
- Windows security modification
- Modifies Internet Explorer settings
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d994da525362001f4bb77691fa977dcb
SHA1590b6a7fadc72ecde07ad802c8ece36876949dc7
SHA256a5b472267bed3218eca234ced00504ecac22b4b062701db4d4eee44f8306b83c
SHA512d4a4ac1ce60b3c9de1665c2831089e38a9a25a00fe35b472115224c5761a61cfdaad1026187c8f3535be964e8b5b2ece93461d1d30bd59bfe1f4dac3bfaae4da
-
Filesize
28KB
MD54d837e1558925bc0f5e877f5622e3d72
SHA181e55afedf9e5cbdb7de3d0a706e4902cf6466c8
SHA25675ee404677b89dff50e0df72052158ef2d06245c8601af00c19cab70fa929b1c
SHA5127c55da66f18ec44cd2793ac72901ed11e437865d98f69402e66a75cbab4dfb419ba3f258b52ae374b9d10ff2083df16bb40437768491b52adaa30e33a32fcad4