Analysis
-
max time kernel
493s -
max time network
593s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2024 12:45
Behavioral task
behavioral1
Sample
1099Misc.pdf
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
msimg32.dll
Resource
win10-20240404-en
General
-
Target
msimg32.dll
-
Size
44.7MB
-
MD5
ce551ef0eead129588bd522b032329a6
-
SHA1
af451cb0e8bd8a72e16df7c861a47389d060fec9
-
SHA256
e9a221f17124d3472c612e242f39b28106ea0391774a9a8c394040af34e3920a
-
SHA512
112ab3d2d1c437e127876d87c074aebe8081503f327816d00453799b1e5307b1163f7de52324ee4e8b195db7ae1f0930677d9d5e984d16532895ed8d88c31ba1
-
SSDEEP
786432:wUP7GCGO7t0Srkx/tC0SzIdSwh/WxbpNHQD3trzRpc1:wUP7GCG6iSrkx1hSzYsHQD3t/RO1
Malware Config
Extracted
asyncrat
1.0.7
CPA
5.253.84.218:54657
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\ChromeData.dll,EntryPoint" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2396 set thread context of 204 2396 regsvr32.exe csc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
csc.exedescription pid process Token: SeDebugPrivilege 204 csc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
regsvr32.exeregsvr32.execmd.exedescription pid process target process PID 1948 wrote to memory of 2396 1948 regsvr32.exe regsvr32.exe PID 1948 wrote to memory of 2396 1948 regsvr32.exe regsvr32.exe PID 1948 wrote to memory of 2396 1948 regsvr32.exe regsvr32.exe PID 2396 wrote to memory of 204 2396 regsvr32.exe csc.exe PID 2396 wrote to memory of 204 2396 regsvr32.exe csc.exe PID 2396 wrote to memory of 204 2396 regsvr32.exe csc.exe PID 2396 wrote to memory of 204 2396 regsvr32.exe csc.exe PID 2396 wrote to memory of 204 2396 regsvr32.exe csc.exe PID 2396 wrote to memory of 4692 2396 regsvr32.exe cmd.exe PID 2396 wrote to memory of 4692 2396 regsvr32.exe cmd.exe PID 2396 wrote to memory of 4692 2396 regsvr32.exe cmd.exe PID 4692 wrote to memory of 4700 4692 cmd.exe reg.exe PID 4692 wrote to memory of 4700 4692 cmd.exe reg.exe PID 4692 wrote to memory of 4700 4692 cmd.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\msimg32.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\msimg32.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:204
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f4⤵
- Adds Run key to start application
PID:4700
-
-
-