Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
651caf951043a1421ebebcc6de35bf9b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
651caf951043a1421ebebcc6de35bf9b.exe
Resource
win10v2004-20231215-en
General
-
Target
651caf951043a1421ebebcc6de35bf9b.exe
-
Size
67KB
-
MD5
651caf951043a1421ebebcc6de35bf9b
-
SHA1
97a210de6ec53ef6da50626f3de4b7ec9d33e3e0
-
SHA256
7a7ad42b177dac2bc6b78249b7cf0f61df38492c7dc1954b9f5c27b29887fd39
-
SHA512
18362cdcced8ea951d96f8c69b36af8d264504c501bdc8d3f7e171faf04c5f25b09d54ca17e6fd4a038c1f4d1f68aba20a1999c425049d0b1ea0de708843613d
-
SSDEEP
1536:SoITrWmbHjz5s+Y5BkmPxPBxAU/bwrD0rTBV0ro:JWPH/5s7+g9z/W0Dl
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2596 651caf951043a1421ebebcc6de35bf9b.exe 3528 rundll32.exe -
resource yara_rule behavioral2/memory/2596-1-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/2596-3-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/2596-4-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/2596-10-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/2596-12-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/2596-18-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/3528-32-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/3528-33-0x0000000010000000-0x0000000010014000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\awtrQKdC.dll,#1" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\byXOeETj.dll 651caf951043a1421ebebcc6de35bf9b.exe File created C:\Windows\SysWOW64\byXOeETj.dll 651caf951043a1421ebebcc6de35bf9b.exe File created C:\Windows\SysWOW64\awtrQKdC.dll 651caf951043a1421ebebcc6de35bf9b.exe File opened for modification C:\Windows\SysWOW64\awtrQKdC.dll 651caf951043a1421ebebcc6de35bf9b.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{309311F1-8F50-452E-A98D-69AFD7A34AA8}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{309311F1-8F50-452E-A98D-69AFD7A34AA8} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{309311F1-8F50-452E-A98D-69AFD7A34AA8}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{309311F1-8F50-452E-A98D-69AFD7A34AA8}\InprocServer32\ = "C:\\Windows\\SysWow64\\awtrQKdC.dll" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2596 651caf951043a1421ebebcc6de35bf9b.exe 2596 651caf951043a1421ebebcc6de35bf9b.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe 3528 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 651caf951043a1421ebebcc6de35bf9b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 651caf951043a1421ebebcc6de35bf9b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2596 wrote to memory of 624 2596 651caf951043a1421ebebcc6de35bf9b.exe 5 PID 2596 wrote to memory of 3528 2596 651caf951043a1421ebebcc6de35bf9b.exe 96 PID 2596 wrote to memory of 3528 2596 651caf951043a1421ebebcc6de35bf9b.exe 96 PID 2596 wrote to memory of 3528 2596 651caf951043a1421ebebcc6de35bf9b.exe 96 PID 2596 wrote to memory of 3704 2596 651caf951043a1421ebebcc6de35bf9b.exe 97 PID 2596 wrote to memory of 3704 2596 651caf951043a1421ebebcc6de35bf9b.exe 97 PID 2596 wrote to memory of 3704 2596 651caf951043a1421ebebcc6de35bf9b.exe 97
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\651caf951043a1421ebebcc6de35bf9b.exe"C:\Users\Admin\AppData\Local\Temp\651caf951043a1421ebebcc6de35bf9b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\awtrQKdC.dll,a2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\651caf951043a1421ebebcc6de35bf9b.exe"2⤵PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD59a7ef09167a6f4433681b94351509043
SHA1259b1375ed8e84943ca1d42646bb416325c89e12
SHA256d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7
SHA51296b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df
-
Filesize
41KB
MD5f48170ea41e051683b0529e194a6cfe2
SHA16cadc67dff6bbf42326f34bcb9482e3912a49a8a
SHA2560cbc202c07951399a7cd425db1d20966375b85d56d0a96c88a20e0ba4592ad6a
SHA512804b4c91f6e11618966441479388a6fcfa609dffb67ec5c4c4c87ebd4951b16463015b56ea9466f9f4de9fe2e503219787c23aefda72c49a39a4b197dc826276