Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
tinyxml.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
tinyxml.dll
Resource
win10v2004-20240508-en
General
-
Target
tinyxml.dll
-
Size
24KB
-
MD5
553fd99899eff49eb8cd3415cd8aa4f0
-
SHA1
3d6a2190be821d2133ef5464af878d5f4d13e408
-
SHA256
ff931eeeeb4dab0545e6261b06ea3f581793406ce9f865ada181972a7b1e7e1e
-
SHA512
4ab56ffba9aca3e9ab0fb3c1ce567f860d83b4f055ada4785ad26e53899d5aa9f5688592e25d21ab1d79dc7b45aef9e12ed0aa1086bfb64cb9c23a7840662719
-
SSDEEP
384:XtOfB+juJ5j7ICYPUcRlSkSib4bv5ONPWswX/X/:9OsKvALX4LswX/X
Malware Config
Extracted
metasploit
windows/download_exec
http://112.74.126.200:443/jquery-3.3.1.slim.min.js
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1944 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1012 wrote to memory of 1944 1012 rundll32.exe rundll32.exe PID 1012 wrote to memory of 1944 1012 rundll32.exe rundll32.exe PID 1012 wrote to memory of 1944 1012 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tinyxml.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tinyxml.dll,#12⤵
- Blocklisted process makes network request
PID:1944
-