Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
e1daf1eb6c0fe8d0096939b90d40c93e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1daf1eb6c0fe8d0096939b90d40c93e.dll
Resource
win10v2004-20240226-en
General
-
Target
e1daf1eb6c0fe8d0096939b90d40c93e.dll
-
Size
442KB
-
MD5
e1daf1eb6c0fe8d0096939b90d40c93e
-
SHA1
65aa8590ff8a4da76e558374bc0a2e4037050930
-
SHA256
71f73367026c28a32e1e6925c38b88991cd0340ce32aafdbc49ae3f01ffd6534
-
SHA512
d88fe03a5b9f058aadb514090c11758fb1204720eaf5f0dfb118992b57219bf2b0405d442528ddb5bacf8640104db81e904529a802be37a6ac62743a4dc5fa69
-
SSDEEP
6144:DKA8+He0qUeSY3Bws4xvEOt/qtCBwNPW7Krypvf0qfsBNOttwHGN4g8J2Wk:EyPPY3BYxvE4ytZt88msBctGHUp
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\{EA2AD6ED4A522BBF44755F2004716FCB}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\709F.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2776 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2852 wrote to memory of 2900 2852 rundll32.exe 28 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29 PID 2900 wrote to memory of 2776 2900 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1daf1eb6c0fe8d0096939b90d40c93e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1daf1eb6c0fe8d0096939b90d40c93e.dll,#12⤵
- Sets service image path in registry
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\68A2.tmp3⤵
- Loads dropped DLL
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD5b49ed0968ec828008936403b113f55c0
SHA1b896e64bd85157f29427ec5916e4340b9e81cb13
SHA256a850cd0a9583055f7deac03f583d26606aa2ce5cac950f5ab6daef4b55b32d53
SHA5123a7b9ee1a5c26e9a6a52e8523e3db610c9194bfa7e6a0e0f98e008aa9aafc1dd9b6470c0a206c8b667436f6928621a7a03e4dcbaf1af4600d7ca91db688466bd