Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 08:09
Behavioral task
behavioral1
Sample
c821288e845f1b9caa1d8de70949ca57.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c821288e845f1b9caa1d8de70949ca57.exe
Resource
win10v2004-20240226-en
General
-
Target
c821288e845f1b9caa1d8de70949ca57.exe
-
Size
47KB
-
MD5
c821288e845f1b9caa1d8de70949ca57
-
SHA1
416399b198a968881168c48ec71f57f4209b76ce
-
SHA256
d006949ada27d9c72fd6f6a2e987bec0d620f55a5794d6e7537d14777858e9e7
-
SHA512
fdcca5e48cc95415253bd5dbea922f51c505f0153922d55a2c5998ea8c98b14acfcdf6d44f45b6b256f00a3d58d644a7ed5194a141b32206e02c817ac3949330
-
SSDEEP
768:+TNR61NTTRTQC1iKZ/tC59qdtPWTFdVYFbq36EQtin2O5bmKBvk02/6:+TL61lTxQCJ/M34PW+lq36TU2OJbBviS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3964 rundll32.exe -
Loads dropped DLL 7 IoCs
pid Process 3840 rundll32.exe 3964 rundll32.exe 2452 rundll32.exe 3840 rundll32.exe 3840 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe -
resource yara_rule behavioral2/memory/5032-0-0x0000000000400000-0x000000000061C000-memory.dmp upx behavioral2/memory/5032-7-0x0000000000400000-0x000000000061C000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\whhfd008.ocx c821288e845f1b9caa1d8de70949ca57.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\whh15013.ocx c821288e845f1b9caa1d8de70949ca57.exe File created C:\Program Files\Common Files\0E5731EDce.dll c821288e845f1b9caa1d8de70949ca57.exe File opened for modification C:\Program Files\Common Files\0E5731EDce.dll c821288e845f1b9caa1d8de70949ca57.exe File created C:\Program Files\Common Files\whh15013.ocx c821288e845f1b9caa1d8de70949ca57.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3964 rundll32.exe 3964 rundll32.exe 3964 rundll32.exe 3964 rundll32.exe 3964 rundll32.exe 3964 rundll32.exe 3964 rundll32.exe 3964 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 2452 rundll32.exe 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2452 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5032 wrote to memory of 3840 5032 c821288e845f1b9caa1d8de70949ca57.exe 89 PID 5032 wrote to memory of 3840 5032 c821288e845f1b9caa1d8de70949ca57.exe 89 PID 5032 wrote to memory of 3840 5032 c821288e845f1b9caa1d8de70949ca57.exe 89 PID 5032 wrote to memory of 2452 5032 c821288e845f1b9caa1d8de70949ca57.exe 90 PID 5032 wrote to memory of 2452 5032 c821288e845f1b9caa1d8de70949ca57.exe 90 PID 5032 wrote to memory of 2452 5032 c821288e845f1b9caa1d8de70949ca57.exe 90 PID 5032 wrote to memory of 3964 5032 c821288e845f1b9caa1d8de70949ca57.exe 91 PID 5032 wrote to memory of 3964 5032 c821288e845f1b9caa1d8de70949ca57.exe 91 PID 5032 wrote to memory of 3964 5032 c821288e845f1b9caa1d8de70949ca57.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c821288e845f1b9caa1d8de70949ca57.exe"C:\Users\Admin\AppData\Local\Temp\c821288e845f1b9caa1d8de70949ca57.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\whhfd008.ocx" pfjieaoidjglkajd2⤵
- Loads dropped DLL
PID:3840
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Program Files\Common Files\0E5731EDce.dll" m32⤵
- Loads dropped DLL
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Program Files\Common Files\whh15013.ocx" pfjaoidjglkajd C:\Users\Admin\AppData\Local\Temp\c821288e845f1b9caa1d8de70949ca57.exe2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f1f49fb85ab029ad86c02ebecb892b12
SHA1664a602f8e843218c1158571714cd0adee1da939
SHA256f8f3abcf8d43377b49d1edce23a667c9efd9cde86e9afee228e8c3b093013f13
SHA512600810f5a23067afb483b2fb5cd980c817d1b79da7fd7c5183a2d76f3546c514256f5536791abd4ed4b949518c63ab7c55df3e9b9109df2681fd3df10dbd2673
-
Filesize
55KB
MD5db8b8cbe844b6804ad5db101431cdfbb
SHA1a12be10bf0b8571a72c4213766aa75713c0d8f67
SHA256fb27f5cea348b565b4f9cca526e6ed901af40ee782b15fe77f9536999d93fe85
SHA5121759f33c22deac0fddd14aa9f130d75c5d6922ea75c67d1fbab7d1431b21b88723ff745918d72df812eb482f86468a928cb89c0e621adda44527dcd21da0dc68
-
Filesize
14KB
MD5731659d09654891912ac223e20cd10ab
SHA113cee04adc7b09ef1c0c6b9abc02d0c7bc02a071
SHA256672639ce00081bdd6b6ee69e1bc816d0b353ed9713b5a21bac6009907daf3d3b
SHA512e2b63a180ff6a9ef523f21a9afe9f71f612f617fbab5b791f763c8bccab14d8cb1986729fadba4bc5f29fe9813766bcb88168018f8c6571ec72efc69639f1116