Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 14:56
Behavioral task
behavioral1
Sample
de4773f30616c5683f88a1b19439a27e.dll
Resource
win7-20240221-en
General
-
Target
de4773f30616c5683f88a1b19439a27e.dll
-
Size
452KB
-
MD5
de4773f30616c5683f88a1b19439a27e
-
SHA1
8b2af25ff00674dffa1b82cef490b5b4b2ee1c6a
-
SHA256
3510acfd881aad5a740a933a96458f9147722b184c9970edfb86fc34a9bfe7ef
-
SHA512
6fa9147c3f41f5d6481cb501aeb76e528ef6ad6104fc559080e227c14b0f9c467af4fefe693fa09f52faf8dba5920fdef75f1d3688008d8bede6bbf804d0f45c
-
SSDEEP
12288:CLgUAsuFz4B3Nd6ykj49cemR9yl3rx7KY:c3nE+3iyXcemRMhx7
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 7 2608 rundll32.exe 8 2608 rundll32.exe 9 2608 rundll32.exe 10 2608 rundll32.exe 11 2608 rundll32.exe 12 2608 rundll32.exe -
Deletes itself 1 IoCs
pid Process 568 cmd.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe -
resource yara_rule behavioral1/memory/2720-0-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2720-1-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2720-2-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2720-3-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2720-4-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/files/0x0024000000015c3c-10.dat themida behavioral1/memory/2608-15-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-16-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-17-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-19-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-18-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2720-28-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-32-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-33-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-34-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-36-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-37-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-39-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-41-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-43-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-45-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-47-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-49-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-51-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-53-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-55-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-57-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-59-0x0000000010000000-0x0000000010127000-memory.dmp themida behavioral1/memory/2608-61-0x0000000010000000-0x0000000010127000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDLL (sdfdfsd34.exe) = "rundll32.exe C:\\Windows\\system32\\sdfdfsd34.exe,start" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sdfdfsd34.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\sdfdfsd34.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 rundll32.exe 2608 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 2608 2720 rundll32.exe 29 PID 2720 wrote to memory of 568 2720 rundll32.exe 30 PID 2720 wrote to memory of 568 2720 rundll32.exe 30 PID 2720 wrote to memory of 568 2720 rundll32.exe 30 PID 2720 wrote to memory of 568 2720 rundll32.exe 30 PID 2720 wrote to memory of 568 2720 rundll32.exe 30 PID 2720 wrote to memory of 568 2720 rundll32.exe 30 PID 2720 wrote to memory of 568 2720 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de4773f30616c5683f88a1b19439a27e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de4773f30616c5683f88a1b19439a27e.dll,#12⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\sdfdfsd34.exe,start3⤵
- Blocklisted process makes network request
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uninstall.bat" "3⤵
- Deletes itself
PID:568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD59495e3d21811320ddf078ec7f084c0ec
SHA1a34770370c2248b27bf1af3f3cb8f27d16117336
SHA25623307d859e39a1f307ceba969c00c451d1993983f6aa360a0909530521aebfab
SHA512b7787ba1a9c4b292f176ac73b64c5b6c06d5c76e0577ccb369ae6f38c1ec0ee77b2654a177821841d3f6bb28bccd50f4b04036ce146484d4d1655b64e15813e9
-
Filesize
452KB
MD5de4773f30616c5683f88a1b19439a27e
SHA18b2af25ff00674dffa1b82cef490b5b4b2ee1c6a
SHA2563510acfd881aad5a740a933a96458f9147722b184c9970edfb86fc34a9bfe7ef
SHA5126fa9147c3f41f5d6481cb501aeb76e528ef6ad6104fc559080e227c14b0f9c467af4fefe693fa09f52faf8dba5920fdef75f1d3688008d8bede6bbf804d0f45c