Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
173043cc55e569c8f997b16752383ecb66ec62f12b9c5f89deb2840542a8fb71.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
173043cc55e569c8f997b16752383ecb66ec62f12b9c5f89deb2840542a8fb71.dll
Resource
win10v2004-20240412-en
General
-
Target
173043cc55e569c8f997b16752383ecb66ec62f12b9c5f89deb2840542a8fb71.dll
-
Size
1.9MB
-
MD5
bc314d07b2ab0ecd11062119144fd4eb
-
SHA1
d5cc56d9ef8b8dd89eb6386347186f3af679b090
-
SHA256
173043cc55e569c8f997b16752383ecb66ec62f12b9c5f89deb2840542a8fb71
-
SHA512
5a9b63fd2e956e53ced90c3a66fb7d31b4fe9eae7f2532e634cf06f76345c63667a4d0e1e51f749444ff5f1066b6130503e8deff805defe3eb982a64e7fbff8c
-
SSDEEP
24576:fqJWkMm1vw+2ixo2e2tDBGgu2jU0698/Nx/NOfTCr4FtWsFNJqJfhsOnC7KdAv:fGY+02eQDXu2jU0f/1r4RPqJfhCK2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4252 winÖ§³Ö¿â.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4544 2884 WerFault.exe 88 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2884 rundll32.exe 4252 winÖ§³Ö¿â.exe 4252 winÖ§³Ö¿â.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4748 wrote to memory of 2884 4748 rundll32.exe 88 PID 4748 wrote to memory of 2884 4748 rundll32.exe 88 PID 4748 wrote to memory of 2884 4748 rundll32.exe 88 PID 2884 wrote to memory of 4252 2884 rundll32.exe 89 PID 2884 wrote to memory of 4252 2884 rundll32.exe 89 PID 2884 wrote to memory of 4252 2884 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\173043cc55e569c8f997b16752383ecb66ec62f12b9c5f89deb2840542a8fb71.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\173043cc55e569c8f997b16752383ecb66ec62f12b9c5f89deb2840542a8fb71.dll,#12⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
F:\Kugou\winÖ§³Ö¿â.exeF:\Kugou\winÖ§³Ö¿â.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 7683⤵
- Program crash
PID:4544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2884 -ip 28841⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1012KB
MD55950290c53caf80d9ae138f83a4990c3
SHA14ae9faa080dd555ddb47c662dca352fb35029471
SHA2568d5f357aa5590f40d4eff0c41c06ebee2a5e96ecbe2308d652a482d29c029b38
SHA512828f9e374c12ac141c71bb1d5797a0267a44598b07b6b4c9ad6b2b40e7fd071ae02d2bca4ec764dc4d330e0c3397e5fe10bd1242e12a0adbea5a4e79fcbe3b43