Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 16:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c1108c6e277e10fa6f871d723cbc7532.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1108c6e277e10fa6f871d723cbc7532.dll
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
c1108c6e277e10fa6f871d723cbc7532.dll
-
Size
184KB
-
MD5
c1108c6e277e10fa6f871d723cbc7532
-
SHA1
b708819fbaf66f00be042e180ee44e415c3fb4dd
-
SHA256
6aa38fbc928902fa2ae3cc684267d6939408c7b5687dea6b4a6e6d9b45da8df1
-
SHA512
ea18380d3805d68465f029a0e0beabfbbd74262128f6e1e479e33543b7c2e5daa718276d6258f1ca47531d24461d1910fdccfd59a91a5172e69d44ad710595b6
-
SSDEEP
3072:kZ6W4tZ9irKCC576Wpp4CZ0IBolFPtyzzoemS4T25ORJtTSV+:BW4hiEoBIHo33Th5
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\rqbmvpso = "{DCEC875B-8D52-4370-83B4-BC34EEDCBDB5}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCEC875B-8D52-4370-83B4-BC34EEDCBDB5} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCEC875B-8D52-4370-83B4-BC34EEDCBDB5}\InProcServer32\ = "C:\\Windows\\rqbmvpso.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCEC875B-8D52-4370-83B4-BC34EEDCBDB5}\InProcServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3868 4100 rundll32.exe 88 PID 4100 wrote to memory of 3868 4100 rundll32.exe 88 PID 4100 wrote to memory of 3868 4100 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1108c6e277e10fa6f871d723cbc7532.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1108c6e277e10fa6f871d723cbc7532.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3868
-