Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
52c2f509847fbd0b4f71f0dfda585e37.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52c2f509847fbd0b4f71f0dfda585e37.dll
Resource
win10v2004-20231222-en
General
-
Target
52c2f509847fbd0b4f71f0dfda585e37.dll
-
Size
32KB
-
MD5
52c2f509847fbd0b4f71f0dfda585e37
-
SHA1
304bc20a71ff757426b76c571f29f9f0f4b68c9b
-
SHA256
30beb4f31397f43b3caec6bf6d4c5a277a203c90451f35fac2bb850f639a6ef7
-
SHA512
5f58a43e245572e2e91a7acbc2bbe0ad02825f2b5cd1409e57c3837c5a0481d331586429125314d51d9a8f9ca521e3ef392496029a158bac3243b804230be1d3
-
SSDEEP
384:+mTPScPQPfRmL7k3F+e/eKRzr+Ujd9VKf6fX1qwnwy/CBfuA:+mpMoL6eKRzr+IHV31qny6BfuA
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "regedit.exe /s \"%1\"" rundll32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2596 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 804 rundll32.exe 804 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 3044 wrote to memory of 804 3044 rundll32.exe 28 PID 804 wrote to memory of 2876 804 rundll32.exe 29 PID 804 wrote to memory of 2876 804 rundll32.exe 29 PID 804 wrote to memory of 2876 804 rundll32.exe 29 PID 804 wrote to memory of 2876 804 rundll32.exe 29 PID 2876 wrote to memory of 2596 2876 cmd.exe 31 PID 2876 wrote to memory of 2596 2876 cmd.exe 31 PID 2876 wrote to memory of 2596 2876 cmd.exe 31 PID 2876 wrote to memory of 2596 2876 cmd.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52c2f509847fbd0b4f71f0dfda585e37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52c2f509847fbd0b4f71f0dfda585e37.dll,#12⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a.reg3⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\regedit.exe"regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\a.reg"4⤵
- Runs .reg file with regedit
PID:2596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5f3dbe232e05c7524d83f53e5b1d74903
SHA173f9f4252efc4ccb54aa7a000ababf88fcd5934c
SHA25624228c7cc91bb36420590e9a46a668d5a336578c64c3db507559c5c24ab69782
SHA512873a02dcf63f1fad1c1b508d8f330fde5ac5fc36c57b2e8ab18b632facd1f6f9c93335e7564cfdb12dc05c6b1317666faebb6a440bd0d968892a31a7d48764e9