Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
d722e0bd19dc4700f5d5d96f3700037b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d722e0bd19dc4700f5d5d96f3700037b.exe
Resource
win10v2004-20231215-en
General
-
Target
d722e0bd19dc4700f5d5d96f3700037b.exe
-
Size
96KB
-
MD5
d722e0bd19dc4700f5d5d96f3700037b
-
SHA1
bc715dedeea4bbf4761732f95e68cd33d83dfdb6
-
SHA256
44c054d85826f22deb01177b0eb40581af345cb3db55ce430a735a172396fd47
-
SHA512
4fc2f40659c04142fcb53a7f93bf2fe37bce8150473f47b05cf3ce9921806385ee7972346e5afbafcf252290f22936d4cce6cca3389bd87d39f8fb69d95b587a
-
SSDEEP
1536:Wpxbg5heTzavxxFUt7ohtR2H4LLKZSVZMIn7JXs8hzOoF:4Fg5heTzIxFUt7Ut4Hifj1sgzZ
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2588 rundll32.exe 2588 rundll32.exe 2588 rundll32.exe 2588 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fgubudocayewi = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\DESpapi.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2372 wrote to memory of 2912 2372 d722e0bd19dc4700f5d5d96f3700037b.exe 28 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29 PID 2912 wrote to memory of 2588 2912 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d722e0bd19dc4700f5d5d96f3700037b.exe"C:\Users\Admin\AppData\Local\Temp\d722e0bd19dc4700f5d5d96f3700037b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\DESpapi.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\DESpapi.dll",iep3⤵
- Loads dropped DLL
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59e61cea8b1400aa106cead6e264fbe70
SHA1fd4e752f433b3fd11efc31d159e29a1478b9b6ce
SHA2563b4f860868646ee22a8a302bfbb1a3583e0b77141c65b895a8e6f11421f7c2c0
SHA51216ce0de699757bbf2379c503a3dbf3ee21d8381b9085f8c914fddb5ca1e4a840796e6cb7db6a4ac2684df674a7388f1a057956259c21be9ccd3c7589ff86244b