Analysis
-
max time kernel
219s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
gmpopenh264.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
gmpopenh264.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
gmpopenh264.info
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
gmpopenh264.info
Resource
win10v2004-20240419-en
General
-
Target
gmpopenh264.dll
-
Size
997KB
-
MD5
fe3355639648c417e8307c6d051e3e37
-
SHA1
f54602d4b4778da21bc97c7238fc66aa68c8ee34
-
SHA256
1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
-
SHA512
8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
SSDEEP
12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
mmc.exedescription ioc process File opened for modification C:\Windows\system32\perfmon.msc mmc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
perfmon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 perfmon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz perfmon.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
perfmon.exemmc.exepid process 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 536 mmc.exe 536 mmc.exe 536 mmc.exe 536 mmc.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe 4932 perfmon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
mmc.exepid process 1028 mmc.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
mmc.exepid process 1028 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
perfmon.exemmc.exemmc.exedescription pid process Token: SeDebugPrivilege 4932 perfmon.exe Token: SeSystemProfilePrivilege 4932 perfmon.exe Token: SeCreateGlobalPrivilege 4932 perfmon.exe Token: 33 536 mmc.exe Token: SeIncBasePriorityPrivilege 536 mmc.exe Token: 33 536 mmc.exe Token: SeIncBasePriorityPrivilege 536 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: SeSecurityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe Token: 33 1028 mmc.exe Token: SeIncBasePriorityPrivilege 1028 mmc.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
mmc.exemmc.exepid process 536 mmc.exe 536 mmc.exe 536 mmc.exe 536 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe 1028 mmc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 3556 wrote to memory of 1352 3556 cmd.exe net.exe PID 3556 wrote to memory of 1352 3556 cmd.exe net.exe PID 1352 wrote to memory of 4432 1352 net.exe net1.exe PID 1352 wrote to memory of 4432 1352 net.exe net1.exe PID 3556 wrote to memory of 624 3556 cmd.exe net.exe PID 3556 wrote to memory of 624 3556 cmd.exe net.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gmpopenh264.dll,#11⤵PID:3556
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:4428
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\system32\net.exenet user2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user3⤵PID:4432
-
-
-
C:\Windows\system32\net.exenet use2⤵PID:624
-
-
C:\Windows\system32\perfmon.exe"C:\Windows\system32\perfmon.exe" /res1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\perfmon.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:536
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1028