Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
56bf51ba72b6aa8cf3876d17869be47a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56bf51ba72b6aa8cf3876d17869be47a.dll
Resource
win10v2004-20231215-en
General
-
Target
56bf51ba72b6aa8cf3876d17869be47a.dll
-
Size
60KB
-
MD5
56bf51ba72b6aa8cf3876d17869be47a
-
SHA1
1edd5c50a648f5e42dd3e3912810c2abe6b6b8ca
-
SHA256
e56d21401db107c5e6c7b7e71a8236bf506cb352ff14b38495a7944e5f8a1397
-
SHA512
edc6302b57786253fc88e22d7223e5ec1907944b63628849c720994b337c540c661e8e7315639e054c2b1d9d31c1eea48902f0137bdae4814b4eb3d16bdc8eac
-
SSDEEP
1536:H4Mev4M8IeRw/gbx1WOXlh9lYTOn8ZAWm26rPrjdeh7:H4Mgue/gbxUS4xZnm2OT5A7
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Canvas = "RunDll32 \"C:\\Program Files (x86)\\Common Files\\Adobe\\Acrobat\\msethost.dll\",Init" rundll32.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\lsalogms.dll rundll32.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\msethost.dll rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\msethost.dll rundll32.exe File created C:\Program Files (x86)\Common Files\Services\srvupsvc.dll rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Services\srvupsvc.dll rundll32.exe File created C:\Program Files (x86)\Common Files\lsalogms.dll rundll32.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1648 wrote to memory of 1744 1648 rundll32.exe 28 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1216 1744 rundll32.exe 13 PID 1744 wrote to memory of 1216 1744 rundll32.exe 13 PID 1744 wrote to memory of 1320 1744 rundll32.exe 12 PID 1744 wrote to memory of 1320 1744 rundll32.exe 12 PID 1744 wrote to memory of 1360 1744 rundll32.exe 11 PID 1744 wrote to memory of 1360 1744 rundll32.exe 11 PID 1744 wrote to memory of 1648 1744 rundll32.exe 20 PID 1744 wrote to memory of 1648 1744 rundll32.exe 20 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29 PID 1744 wrote to memory of 1952 1744 rundll32.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56bf51ba72b6aa8cf3876d17869be47a.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56bf51ba72b6aa8cf3876d17869be47a.dll,#13⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\56bf51ba72b6aa8cf3876d17869be47a.dll",Init4⤵PID:1952
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD556bf51ba72b6aa8cf3876d17869be47a
SHA11edd5c50a648f5e42dd3e3912810c2abe6b6b8ca
SHA256e56d21401db107c5e6c7b7e71a8236bf506cb352ff14b38495a7944e5f8a1397
SHA512edc6302b57786253fc88e22d7223e5ec1907944b63628849c720994b337c540c661e8e7315639e054c2b1d9d31c1eea48902f0137bdae4814b4eb3d16bdc8eac