Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 09:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
67408553f723f42dc8a080108df72fc3.dll
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
67408553f723f42dc8a080108df72fc3.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
67408553f723f42dc8a080108df72fc3.dll
-
Size
11KB
-
MD5
67408553f723f42dc8a080108df72fc3
-
SHA1
0755d2c692edb9de190942edb77093e550efc047
-
SHA256
407fb414b0fcec0bd9a0cbaadfedd14c5995c2c6147ca49228733c78348a2f63
-
SHA512
bc73bf75f033d25cdaa2eb69cd5b57c33407ee76b1c5dd98be032b4f1ea9535dfa2f4e673cad3a6da4a2cbd04553c0e3a9ac855bb20928f164e2fb6c7ab856cf
-
SSDEEP
192:C9u5qK0Tz2ZRrL0GaHMQ0UOmPQKzYoun1dLtjAJjcU9eL5rWKmboK4YHCFCkgUwM:8uEK0TARr9CHh3Youn1dZslcUkl1msK8
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msosmnsf00.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msosmnsf00.dll rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2356 rundll32.exe 2356 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 rundll32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2056 wrote to memory of 2356 2056 rundll32.exe 28 PID 2356 wrote to memory of 260 2356 rundll32.exe 27 PID 2356 wrote to memory of 336 2356 rundll32.exe 26 PID 2356 wrote to memory of 384 2356 rundll32.exe 25 PID 2356 wrote to memory of 400 2356 rundll32.exe 24 PID 2356 wrote to memory of 436 2356 rundll32.exe 23 PID 2356 wrote to memory of 480 2356 rundll32.exe 22 PID 2356 wrote to memory of 496 2356 rundll32.exe 21 PID 2356 wrote to memory of 504 2356 rundll32.exe 20 PID 2356 wrote to memory of 600 2356 rundll32.exe 19 PID 2356 wrote to memory of 680 2356 rundll32.exe 18 PID 2356 wrote to memory of 748 2356 rundll32.exe 17 PID 2356 wrote to memory of 824 2356 rundll32.exe 16 PID 2356 wrote to memory of 860 2356 rundll32.exe 15 PID 2356 wrote to memory of 972 2356 rundll32.exe 13 PID 2356 wrote to memory of 276 2356 rundll32.exe 12 PID 2356 wrote to memory of 1044 2356 rundll32.exe 11 PID 2356 wrote to memory of 1076 2356 rundll32.exe 10 PID 2356 wrote to memory of 1100 2356 rundll32.exe 9 PID 2356 wrote to memory of 1112 2356 rundll32.exe 8 PID 2356 wrote to memory of 1172 2356 rundll32.exe 7 PID 2356 wrote to memory of 1456 2356 rundll32.exe 5 PID 2356 wrote to memory of 2972 2356 rundll32.exe 4 PID 2356 wrote to memory of 2052 2356 rundll32.exe 3 PID 2356 wrote to memory of 2056 2356 rundll32.exe 1
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67408553f723f42dc8a080108df72fc3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67408553f723f42dc8a080108df72fc3.dll,#12⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵PID:2972
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1100
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1076
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵PID:276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵PID:680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:600
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:504
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:496
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:480
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:400
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260