Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
a28cc17a3a1b2a6233f0cd25a7342626.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a28cc17a3a1b2a6233f0cd25a7342626.exe
Resource
win10v2004-20240221-en
General
-
Target
a28cc17a3a1b2a6233f0cd25a7342626.exe
-
Size
39KB
-
MD5
a28cc17a3a1b2a6233f0cd25a7342626
-
SHA1
b1ab4bba6f3c3ffe399bdb3c2c33de23b6907535
-
SHA256
925d7d8c593eea153d6338be2d829f46f7ddec517b02369642dd5df3ba629318
-
SHA512
8b8398593c7897594484852813341ed86ecbada09b3ecf75d2bb30decd1d28c58454ac8499e5bdfa86979bf93045f1ae516d8e6068ea1c7de18c3d40172316b5
-
SSDEEP
768:yd6orTi7hkmeFIbtqADYdz2SGUuJ9wqtsJz91I6:TorTitkmQIsADYdzT4KJ3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3624 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ywukiqiy = "rundll32.exe \"C:\\Windows\\Lcarowilojihu.dll\",e" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Lcarowilojihu.dll a28cc17a3a1b2a6233f0cd25a7342626.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3624 4448 a28cc17a3a1b2a6233f0cd25a7342626.exe 88 PID 4448 wrote to memory of 3624 4448 a28cc17a3a1b2a6233f0cd25a7342626.exe 88 PID 4448 wrote to memory of 3624 4448 a28cc17a3a1b2a6233f0cd25a7342626.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a28cc17a3a1b2a6233f0cd25a7342626.exe"C:\Users\Admin\AppData\Local\Temp\a28cc17a3a1b2a6233f0cd25a7342626.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\Lcarowilojihu.dll",e2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:3624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5e32cad9e350f3d5274e686b6b6ad60ac
SHA16b7bc7f1cfcb35304ca19d21e25c2bd5074efd82
SHA256c6b40ff53c40f1de6663a5fb8a26694317e9f3a6e168a5bec2658cb2a11f6409
SHA51294df8bbb99d97034ca3585d985bc5e47c7ee32ea01ca1718fb6086228eff92f3786afc6296dc40f4c487ad321d7d558cd55471c5b10e8b16409e6147da6dacd2