Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
995c8b9cdaf3e54ea41f4fd97c6f989b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
995c8b9cdaf3e54ea41f4fd97c6f989b.dll
Resource
win10v2004-20231215-en
General
-
Target
995c8b9cdaf3e54ea41f4fd97c6f989b.dll
-
Size
110KB
-
MD5
995c8b9cdaf3e54ea41f4fd97c6f989b
-
SHA1
2ffe970eb0cb6ee420f2f61461de0a30fd3251ed
-
SHA256
419c74a3083695dabe2c59f2d4d2e49b53996ee6352f037abc672becb93df7a0
-
SHA512
26a2d2e200cb4b0bfc18be9e235ade017d499e914e9cb58a8e63433de334c0dd7a5b7ff850451e075d20fb4235c5e8471e7ba406538bd44c254eb1db19505031
-
SSDEEP
1536:fy8Q6o9/onIze7zVRaDk20Lmw+RsIL1zfoASgVMo1Cc+zxr2VLBHT:fyr9fz8T6E+RZLpThMo1CBzxrC1H
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winnet.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 4528 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4528 1820 rundll32.exe 84 PID 1820 wrote to memory of 4528 1820 rundll32.exe 84 PID 1820 wrote to memory of 4528 1820 rundll32.exe 84 PID 4528 wrote to memory of 4748 4528 rundll32.exe 85 PID 4528 wrote to memory of 4748 4528 rundll32.exe 85 PID 4528 wrote to memory of 4748 4528 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\995c8b9cdaf3e54ea41f4fd97c6f989b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\995c8b9cdaf3e54ea41f4fd97c6f989b.dll,#12⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DelEx.bat" "3⤵PID:4748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55390347822bd255bcb75299cfef33c78
SHA11ca8c7165dbe2c25ccba5810643e5f6ea47a27fc
SHA256740c230b59e7cec944d0247d25043068a2398d17730e9b950d6267685f3bf43f
SHA5128f2476b7fa1042c6100e57b7cae97e296ec7de71950826593714bb54126c215c19e0fad0f653c2f6848c1332cb115a37403d241e6ae0740c269a53fa451f780c