Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
8fc7c1c53bb2b95576968a2bd3086b12.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fc7c1c53bb2b95576968a2bd3086b12.dll
Resource
win10v2004-20231215-en
General
-
Target
8fc7c1c53bb2b95576968a2bd3086b12.dll
-
Size
110KB
-
MD5
8fc7c1c53bb2b95576968a2bd3086b12
-
SHA1
46446c12d36457da232b495cc9c3a8596d4efad1
-
SHA256
a9b89e001fe382a51fc329470dde3cbc463c42386f53018054fb79710e9a333f
-
SHA512
efac4111b9582e14449c4a5284225300ad22c587a8db25652225dfba703f0a25cd0b282c9db03624e063336cfff36c662f6240d560ad912ab49077fda1ca2f18
-
SSDEEP
3072:FOIjkBipGSfYurYY1NDM7QnXFlHHdn5X07g:Mmk4xf7YY1NA7G5X0
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 228 rundll32.exe -
resource yara_rule behavioral2/memory/4428-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4428-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4428-4-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4428-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4428-8-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/228-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/228-14-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/228-15-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{08afb971-dd89-466b-8a4e-aeac60400ad1} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{08afb971-dd89-466b-8a4e-aeac60400ad1}\ = "{1da00406-caea-e4a8-b664-98dd179bfa80}" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\asumzu.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\asumzu.dll rundll32.exe -
Modifies registry class 23 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Version rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\TypeLib rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\InprocServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08afb971-dd89-466b-8a4e-aeac60400ad1} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32 rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\VersionIndependentProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Programmable rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08afb971-dd89-466b-8a4e-aeac60400ad1}\InprocServer32\ThreadingModel = "free" rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\ProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08afb971-dd89-466b-8a4e-aeac60400ad1}\InprocServer32\ = "C:\\Windows\\SysWow64\\asumzu.dll" rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08afb971-dd89-466b-8a4e-aeac60400ad1}\InprocServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 64 wrote to memory of 4428 64 rundll32.exe 84 PID 64 wrote to memory of 4428 64 rundll32.exe 84 PID 64 wrote to memory of 4428 64 rundll32.exe 84 PID 4428 wrote to memory of 228 4428 rundll32.exe 85 PID 4428 wrote to memory of 228 4428 rundll32.exe 85 PID 4428 wrote to memory of 228 4428 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8fc7c1c53bb2b95576968a2bd3086b12.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8fc7c1c53bb2b95576968a2bd3086b12.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\asumzu.dll",i3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD58fc7c1c53bb2b95576968a2bd3086b12
SHA146446c12d36457da232b495cc9c3a8596d4efad1
SHA256a9b89e001fe382a51fc329470dde3cbc463c42386f53018054fb79710e9a333f
SHA512efac4111b9582e14449c4a5284225300ad22c587a8db25652225dfba703f0a25cd0b282c9db03624e063336cfff36c662f6240d560ad912ab49077fda1ca2f18