Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 14:17
Behavioral task
behavioral1
Sample
d65307f2c6d672d2734f54a14bf1977b.dll
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
d65307f2c6d672d2734f54a14bf1977b.dll
-
Size
88KB
-
MD5
d65307f2c6d672d2734f54a14bf1977b
-
SHA1
39040f6eceacee7c1769b888ac2707fc47a57df8
-
SHA256
d205d311b0c000d722bf2aa3e6d17e519dc2460cd3de0d728cceb0654390c415
-
SHA512
4acc3a3c04ddfc3efdbf09f999849f7c7083ad9bc347c24848e3c2fff97296982fd4044ac45b44b3a5e25b58d9429bfa7a700a9954e79423e17fa610e1d36155
-
SSDEEP
1536:XMuJovorLdqZUEGPjYbFcMGxoVC0vRkQIYkiQ//WhT12gu7qH:XawrnEGPjmvGutv6Dv/kv
Malware Config
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 11 2012 rundll32.exe 14 2012 rundll32.exe 49 2012 rundll32.exe 74 2012 rundll32.exe 96 2012 rundll32.exe 98 2012 rundll32.exe 138 2012 rundll32.exe 139 2012 rundll32.exe 155 2012 rundll32.exe 177 2012 rundll32.exe 201 2012 rundll32.exe 214 2012 rundll32.exe 215 2012 rundll32.exe 229 2012 rundll32.exe 303 2012 rundll32.exe 326 2012 rundll32.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3728 netsh.exe -
resource yara_rule behavioral2/memory/2012-0-0x0000000000B00000-0x0000000000B2D000-memory.dmp upx behavioral2/memory/2012-1-0x0000000000B00000-0x0000000000B2D000-memory.dmp upx behavioral2/memory/2012-2-0x0000000000B00000-0x0000000000B2D000-memory.dmp upx behavioral2/memory/2012-5-0x0000000000B00000-0x0000000000B2D000-memory.dmp upx behavioral2/memory/2012-15-0x0000000000B00000-0x0000000000B2D000-memory.dmp upx -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 checkip.dyndns.org 213 checkip.dyndns.org -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Security rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Security\installation_id = fd2bb72b2829174bb2eee863cb2089a0 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2012 3956 rundll32.exe 89 PID 3956 wrote to memory of 2012 3956 rundll32.exe 89 PID 3956 wrote to memory of 2012 3956 rundll32.exe 89 PID 2012 wrote to memory of 3728 2012 rundll32.exe 90 PID 2012 wrote to memory of 3728 2012 rundll32.exe 90 PID 2012 wrote to memory of 3728 2012 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d65307f2c6d672d2734f54a14bf1977b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d65307f2c6d672d2734f54a14bf1977b.dll,#12⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\SysWOW64\rundll32.exe" "Explorer" enable3⤵
- Modifies Windows Firewall
PID:3728
-
-