Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
dfcb5869a53b77b0508febddfac186ea.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfcb5869a53b77b0508febddfac186ea.dll
Resource
win10v2004-20240226-en
General
-
Target
dfcb5869a53b77b0508febddfac186ea.dll
-
Size
32KB
-
MD5
dfcb5869a53b77b0508febddfac186ea
-
SHA1
e823deea9bec03a8171fb03c00224217aff78a06
-
SHA256
1646c032c7726fb2da7301eda1caeaef06645aec7b65be34e4cd4ae8dd96b36e
-
SHA512
955dd63a5853a0f36272694186bdd9de44a5698c63d1a1a5b69407edd1c7cae8aa925f44bf70bb55fd2f503442a0dc5920f015268e3bc83ee06b3108ca9cb889
-
SSDEEP
768:wvxxY6H50BFFZFOO+Q548Szj4g/7aygIhWk6q:CxYBBF0O+Q541j4Nuv
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4496 rundll32.exe 4496 rundll32.exe 6076 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\tuvUNeed.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\tuvUNeed.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\tuvUNeed.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1B44E59C-165C-4EE2-B3CD-4DFD348BE123} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1B44E59C-165C-4EE2-B3CD-4DFD348BE123}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1B44E59C-165C-4EE2-B3CD-4DFD348BE123}\InprocServer32\ = "C:\\Windows\\SysWow64\\tuvUNeed.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1B44E59C-165C-4EE2-B3CD-4DFD348BE123}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4496 rundll32.exe 4496 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe 6076 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4496 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4496 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4496 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4496 1096 rundll32.exe 87 PID 1096 wrote to memory of 4496 1096 rundll32.exe 87 PID 1096 wrote to memory of 4496 1096 rundll32.exe 87 PID 4496 wrote to memory of 612 4496 rundll32.exe 5 PID 4496 wrote to memory of 6076 4496 rundll32.exe 106 PID 4496 wrote to memory of 6076 4496 rundll32.exe 106 PID 4496 wrote to memory of 6076 4496 rundll32.exe 106
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfcb5869a53b77b0508febddfac186ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfcb5869a53b77b0508febddfac186ea.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\tuvUNeed.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5dfcb5869a53b77b0508febddfac186ea
SHA1e823deea9bec03a8171fb03c00224217aff78a06
SHA2561646c032c7726fb2da7301eda1caeaef06645aec7b65be34e4cd4ae8dd96b36e
SHA512955dd63a5853a0f36272694186bdd9de44a5698c63d1a1a5b69407edd1c7cae8aa925f44bf70bb55fd2f503442a0dc5920f015268e3bc83ee06b3108ca9cb889