Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
21c8dd6c720928e7fd9f0ed914a3dfff29b240a1b647ea6929c0b881ca485759.dll
Resource
win7-20240220-en
General
-
Target
21c8dd6c720928e7fd9f0ed914a3dfff29b240a1b647ea6929c0b881ca485759.dll
-
Size
1.6MB
-
MD5
af9c842e1fb7c7c19e2adaaaab745353
-
SHA1
943152839af8595fa94009f28940b371c0f9316e
-
SHA256
21c8dd6c720928e7fd9f0ed914a3dfff29b240a1b647ea6929c0b881ca485759
-
SHA512
0cea1e55abca6ce6577c41d0f15804a15715dfbbf0c90e8f3bf0e76857329ab9336b016265399cd8c6ede8efab80068f853e9e775a382a8a779d5c6f21b2fc17
-
SSDEEP
49152:bbK8Jw9oCKTmlkaTDnokjscqnT+8ZIlwVHkm:buai/Az1ZIlwh/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1342.tmppid process 2920 1342.tmp -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 2916 rundll32.exe 2916 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 64 IoCs
Processes:
1342.tmpdescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\atiilhag.inf_amd64_neutral_0a660e899f5038a2\atiumdva.dll 1342.tmp File created C:\Windows\SysWOW64\mfc40u.dll 1342.tmp File created C:\Windows\SysWOW64\msrd3x40.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\vccorlib120.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\vcomp140.dll 1342.tmp File created C:\Windows\SysWOW64\d3dim.dll 1342.tmp File created C:\Windows\SysWOW64\FXSXP32.dll 1342.tmp File created C:\Windows\SysWOW64\ir32_32.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\mfc110.dll 1342.tmp File created C:\Windows\System32\DriverStore\FileRepository\atiilhag.inf_amd64_neutral_0a660e899f5038a2\amdpcom32.dll 1342.tmp File created C:\Windows\System32\DriverStore\FileRepository\atiilhag.inf_amd64_neutral_0a660e899f5038a2\atidxx32.dll 1342.tmp File created C:\Windows\System32\DriverStore\FileRepository\igdlh.inf_amd64_neutral_54a12b57f547d08e\igd10umd32.dll 1342.tmp File created C:\Windows\SysWOW64\sqlwoa.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\mfc100.dll 1342.tmp File created C:\Windows\SysWOW64\msexch40.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\msvcr100.dll 1342.tmp File created C:\Windows\SysWOW64\msxbde40.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\mfc110u.dll 1342.tmp File created C:\Windows\SysWOW64\msrd2x40.dll 1342.tmp File created C:\Windows\SysWOW64\InstallShield\setup.exe 1342.tmp File created C:\Windows\SysWOW64\audiodev.dll 1342.tmp File created C:\Windows\SysWOW64\ir41_32.ax 1342.tmp File created C:\Windows\SysWOW64\ivfsrc.ax 1342.tmp File opened for modification C:\Windows\SysWOW64\mfc100u.dll 1342.tmp File created C:\Windows\SysWOW64\odbcjt32.dll 1342.tmp File created C:\Windows\SysWOW64\d3d8.dll 1342.tmp File created C:\Windows\SysWOW64\d3dxof.dll 1342.tmp File created C:\Windows\SysWOW64\dplaysvr.exe 1342.tmp File created C:\Windows\SysWOW64\mstext40.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\atl100.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\concrt140.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\mfc120.dll 1342.tmp File created C:\Windows\SysWOW64\crtdll.dll 1342.tmp File created C:\Windows\SysWOW64\dplayx.dll 1342.tmp File created C:\Windows\SysWOW64\msexcl40.dll 1342.tmp File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-MediaPlayer\MediaPlayer-DLMigPlugin.dll 1342.tmp File created C:\Windows\SysWOW64\msjet40.dll 1342.tmp File created C:\Windows\SysWOW64\dmscript.dll 1342.tmp File created C:\Windows\SysWOW64\dpwsockx.dll 1342.tmp File created C:\Windows\SysWOW64\explorer.exe 1342.tmp File created C:\Windows\SysWOW64\expsrv.dll 1342.tmp File created C:\Windows\SysWOW64\msjter40.dll 1342.tmp File created C:\Windows\SysWOW64\msvbvm60.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\msvcr120.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\msvcr120_clr0400.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\atl110.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\FM20.DLL 1342.tmp File created C:\Windows\SysWOW64\mfc40.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\MSCOMCTL.OCX 1342.tmp File created C:\Windows\SysWOW64\msvcrt20.dll 1342.tmp File created C:\Windows\SysWOW64\mswdat10.dll 1342.tmp File created C:\Windows\SysWOW64\sqlunirl.dll 1342.tmp File created C:\Windows\System32\DriverStore\FileRepository\atiilhag.inf_amd64_neutral_0a660e899f5038a2\atiumdag.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\msvcr110.dll 1342.tmp File opened for modification C:\Windows\SysWOW64\mfc140.dll 1342.tmp File created C:\Windows\SysWOW64\msjtes40.dll 1342.tmp File created C:\Windows\SysWOW64\msrepl40.dll 1342.tmp File created C:\Windows\SysWOW64\ir50_32.dll 1342.tmp File created C:\Windows\SysWOW64\msorcl32.dll 1342.tmp File created C:\Windows\System32\DriverStore\FileRepository\nv_lh.inf_amd64_neutral_bc69f20e3115af59\nvd3dum.dll 1342.tmp File created C:\Windows\SysWOW64\olecli32.dll 1342.tmp File created C:\Windows\SysWOW64\rdvgumd32.dll 1342.tmp File created C:\Windows\SysWOW64\regedit.exe 1342.tmp File opened for modification C:\Windows\SysWOW64\VBAME.DLL 1342.tmp -
Drops file in Program Files directory 64 IoCs
Processes:
1342.tmpdescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLMAIL.FAE 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7EN.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACER3X.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Csi.dll 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WPFT532.CNV 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EntityPicker.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFOWC.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLADD.FAE 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\ADMPlugin.apl 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1STAR.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolui100.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DESKSAM.SAM 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ACT3.SAM 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\MSGR3EN.DLL 1342.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ahclient.dll 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\vstoee.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmdlocal.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnWD.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONMAIN.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SOA.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\VBAJET32.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FPLACE.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\MOFL.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWCUTCHR.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XPAGE3C.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLNOTE.FAE 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\PortalConnectCore.dll 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\IMCONTACT.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 1342.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INTLDATE.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7tkjp.dll 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_PDF.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OART.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNoteSyncPC.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceca35.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DBGHELP.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\ReadOutLoud.api 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search.api 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SendMail.api 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d 1342.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroPDF.dll 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\ITIRCL55.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OARTCONV.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnPPT.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PSTPRX32.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WWLIB.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api 1342.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IMPMAIL.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\AiodLite.dll 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAME.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLACCT.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPCORE.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.DLL 1342.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll 1342.tmp -
Drops file in Windows directory 64 IoCs
Processes:
1342.tmpdescription ioc process File created C:\Windows\winsxs\x86_microsoft-windows-cipher_31bf3856ad364e35_6.1.7600.16385_none_acecd57e066c38ac\cipher.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-fde_31bf3856ad364e35_6.1.7601.17514_none_aa136561b9ed4ae4\fde.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..rds-datafactory-dll_31bf3856ad364e35_6.1.7601.17514_none_f1691d6d94363b2f\msadcf.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-mapi_31bf3856ad364e35_6.1.7601.17514_none_ad54ab3a7801c830\mapistub.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-ie-feedsbs_31bf3856ad364e35_8.0.7601.17514_none_190fa02cb006154d\msfeedsbs.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-ie-htmlconverter_31bf3856ad364e35_8.0.7601.17514_none_87da61075c9f17a8\html.iec 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-com-dtc-client_31bf3856ad364e35_6.1.7600.16385_none_b33c89b0075f9149\xolehlp.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-d..s-ime-japanese-core_31bf3856ad364e35_6.1.7600.16385_none_d5b4f96cdbb9a8b1\IMJPDSVR.EXE 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..factory-handler-dll_31bf3856ad364e35_6.1.7601.17514_none_6d62af8119e1872c\msdfmap.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..terface-remoting-ps_31bf3856ad364e35_6.1.7600.16385_none_ec4c512325381e78\msdaps.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\IMCCPHR.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_7.1.7601.16492_none_89a132998a8975e7\WindowsCodecs.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-c..complus-runtime-qfe_31bf3856ad364e35_6.1.7600.16385_none_6b3984a4d9e2684a\colbact.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-dxptasks-ringtone_31bf3856ad364e35_6.1.7601.17514_none_b0945a7f704488ee\DXPTaskRingtone.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-fontview_31bf3856ad364e35_6.1.7600.16385_none_443a636317ca9b75\fontview.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-help-storagelayer_31bf3856ad364e35_6.1.7600.16385_none_de737c19662130e7\apss.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..-management-console_31bf3856ad364e35_6.1.7600.16385_none_0f49a133d6f5d42b\cic.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-help-datalayer_31bf3856ad364e35_6.1.7600.16385_none_c490fde17faa7eaa\apds.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-shutdown-event-tracker_31bf3856ad364e35_6.1.7600.16385_none_02aa6dd4294b8d5f\shutdown.exe 1342.tmp File created C:\Windows\winsxs\x86_netfx-ngen_exe_b03f5f7f11d50a3a_6.1.7601.17514_none_4c193e6507471ede\ngen.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-installer-executable_31bf3856ad364e35_6.1.7601.17514_none_4b88deb7e45bfbb0\msiexec.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..components-jetexcel_31bf3856ad364e35_6.1.7600.16385_none_1de500b1a390aab9\msexcl40.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-security-spp-pidgenx_31bf3856ad364e35_6.1.7600.16385_none_01492afa24f8db99\pidgenx.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-ieframe_31bf3856ad364e35_8.0.7601.17514_none_e7d7639870214e02\ieui.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-iis-legacysnapin_31bf3856ad364e35_6.1.7601.17514_none_e99b83c8fd064a06\uihelper.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-msxml30_31bf3856ad364e35_6.1.7601.17514_none_f0e8f05be1d66e78\msxml3.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-directshow-vfw-capture_31bf3856ad364e35_6.1.7601.17514_none_d88590af85321bf2\vfwwdm32.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_8.0.7601.17514_none_1eaaa4a07717236e\jsproxy.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..mponents-jetintlerr_31bf3856ad364e35_6.1.7600.16385_none_0f472a3521bdcfd4\msjter40.dll 1342.tmp File created C:\Windows\winsxs\Backup\x86_microsoft-windows-efs-core-library_31bf3856ad364e35_6.1.7601.17514_none_58a94d70f5cca7eb_efscore.dll_2a98ded7 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-eventcollector_31bf3856ad364e35_6.1.7600.16385_none_61573ee0c2c4be2b\wecutil.exe 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-processmodel_31bf3856ad364e35_6.1.7601.17514_none_1f3c3defefc3a10e\w3wp.exe 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-rasctrs_31bf3856ad364e35_6.1.7600.16385_none_7a67b4b8c47a30e2\rasctrs.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-bcrypt-primitives-dll_31bf3856ad364e35_6.1.7600.16385_none_1207cf88785de24d\bcryptprimitives.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-directx-direct3d11_31bf3856ad364e35_7.1.7601.16492_none_e2d7c9f5b7176f4e\d3d11.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-indeo5-codecs_31bf3856ad364e35_6.1.7600.16385_none_24d6d974d24f7d95\ivfsrc.ax 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-taskmgr_31bf3856ad364e35_6.1.7601.17514_none_16699919077609d2\taskmgr.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-usbui_31bf3856ad364e35_6.1.7600.16385_none_5b256c1b0e32752b\usbui.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..cursor-library-ansi_31bf3856ad364e35_6.1.7600.16385_none_4e209b19020866d5\odbccr32.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-n..n_service_migplugin_31bf3856ad364e35_6.1.7600.16385_none_5e24e56caba0b429\IasMigPlugin.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_a088921d241bbb4e\scecli.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-g..ppolicy-policymaker_31bf3856ad364e35_6.1.7601.17514_none_39509edea73e0ced\gpprefcl.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-remotesp_31bf3856ad364e35_6.1.7600.16385_none_aefa4fc5b836c200\remotesp.tsp 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-security-kerberos_31bf3856ad364e35_6.1.7601.17514_none_4f518cecfbcddc34\kerberos.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-ie-antiphishfilter_31bf3856ad364e35_8.0.7600.16385_none_1622b3b244141a27\ieapfltr.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-rpc-remote_31bf3856ad364e35_6.1.7601.17514_none_c2a09d30916321d9\RpcRtRemote.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-i..mlrenderingadvanced_31bf3856ad364e35_8.0.7601.17514_none_63fa9d9d3e74ef7b\mstime.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-ie-htmlediting_31bf3856ad364e35_11.2.9600.16428_none_34d4a6c78cd3b895\mshtmled.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-d..japanese-propertyui_31bf3856ad364e35_6.1.7600.16385_none_929776facb7f4f74\imjputyc.dll 1342.tmp File created C:\Windows\winsxs\x86_netfx-peverify_dll_b03f5f7f11d50a3a_6.1.7600.16385_none_711dc6fb06230c92\peverify.dll 1342.tmp File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\MmcAspExt.dll 1342.tmp File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\admwprox.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-c..complus-runtime-qfe_31bf3856ad364e35_6.1.7600.16385_none_6b3984a4d9e2684a\clbcatq.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..mdac-sql-netlibs-np_31bf3856ad364e35_6.1.7600.16385_none_eeb24528dbcb8823\dbnmpntw.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-terminalservices-theme_31bf3856ad364e35_6.1.7600.16385_none_d5bc65ffdc22ec35\TSTheme.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-wpd-legacywmdmapi_31bf3856ad364e35_6.1.7600.16385_none_5980e766d0fe239f\wmdmlog.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.6161_none_4bf7e3e2bf9ada4c\mfc90u.dll 1342.tmp File created C:\Windows\winsxs\x86_netfx-perfcounter_dll_b03f5f7f11d50a3a_6.1.7600.16385_none_fe5e474bbbf4bf39\PerfCounter.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..qlserver-driver-dll_31bf3856ad364e35_6.1.7601.17514_none_672bf0635cd400bc\sqlsrv32.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-wmviddsp_31bf3856ad364e35_6.1.7600.16385_none_a6ba49cfd6917b1b\VIDRESZR.DLL 1342.tmp File created C:\Windows\winsxs\x86_netfx-cvtres_for_vc_and_vb_b03f5f7f11d50a3a_6.1.7601.17514_none_ba1c770af0b2031b\cvtres.exe 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-cmi_31bf3856ad364e35_6.1.7601.17514_none_abd5b433b8ccf7a4\cmiv2.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-m..mponents-jetintlerr_31bf3856ad364e35_6.1.7600.16385_none_0f472a3521bdcfd4\mswdat10.dll 1342.tmp File created C:\Windows\winsxs\x86_microsoft-windows-mediaplayer-logagent_31bf3856ad364e35_6.1.7601.17514_none_ed47f623204af12a\logagent.exe 1342.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2872 wrote to memory of 2916 2872 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2920 2916 rundll32.exe 1342.tmp PID 2916 wrote to memory of 2920 2916 rundll32.exe 1342.tmp PID 2916 wrote to memory of 2920 2916 rundll32.exe 1342.tmp PID 2916 wrote to memory of 2920 2916 rundll32.exe 1342.tmp
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21c8dd6c720928e7fd9f0ed914a3dfff29b240a1b647ea6929c0b881ca485759.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21c8dd6c720928e7fd9f0ed914a3dfff29b240a1b647ea6929c0b881ca485759.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\1342.tmpC:\Users\Admin\AppData\Local\Temp\1342.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666