Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 03:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b4238d21c4bb1338881a9132e6a515e.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8b4238d21c4bb1338881a9132e6a515e.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
8b4238d21c4bb1338881a9132e6a515e.dll
-
Size
252KB
-
MD5
8b4238d21c4bb1338881a9132e6a515e
-
SHA1
45e5d9892c294e936eac2426634042d23f8a42b0
-
SHA256
bb830e6480d906ea0d25a4cc01f85ec1a3db9fbe0e0f139ff036af2288a2d12a
-
SHA512
63c9621db59a8af51ac76de49c84ef2f2e4e1fc1267a5e5eeee0729ee8e259e670cd0245b3739f757c4ba4c0561fbc710ae416491861cf812c164114db27b4e8
-
SSDEEP
3072:tuY3H2WT/OmcQau0J7uXhp8l4lqwBVifxyGX2R2CYV7bgd0578GY/Is6CGogU+yo:tdp3iZyGZpvp56/IsVGogUh5koLbOd6
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\agrlmvp = "{584A99DA-7979-4C6E-A781-9686A26E02B2}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{584A99DA-7979-4C6E-A781-9686A26E02B2} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{584A99DA-7979-4C6E-A781-9686A26E02B2}\InProcServer32\ = "C:\\Windows\\agrlmvp.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{584A99DA-7979-4C6E-A781-9686A26E02B2}\InProcServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4264 1128 rundll32.exe 84 PID 1128 wrote to memory of 4264 1128 rundll32.exe 84 PID 1128 wrote to memory of 4264 1128 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b4238d21c4bb1338881a9132e6a515e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b4238d21c4bb1338881a9132e6a515e.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4264
-