Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
efb2a3a0a0a03f5078818c9108f43cb658f92aac0b7b9710f5eccd9e36bc028b.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
efb2a3a0a0a03f5078818c9108f43cb658f92aac0b7b9710f5eccd9e36bc028b.dll
Resource
win10v2004-20240426-en
General
-
Target
efb2a3a0a0a03f5078818c9108f43cb658f92aac0b7b9710f5eccd9e36bc028b.dll
-
Size
496KB
-
MD5
af534395bb77e1033cefdc47afa86829
-
SHA1
9eab83d53442b540554e637ea46fa9c9928c6877
-
SHA256
efb2a3a0a0a03f5078818c9108f43cb658f92aac0b7b9710f5eccd9e36bc028b
-
SHA512
1c819463b18db284ea5269c2739a09e0c66ffd38dd501b19d568ce332f6bc51434231dc895c5670639aa68ccc5a46df0b09beddc6193e34ffd70056532c2a999
-
SSDEEP
6144:Pi05kH9OyU2uv5SRf/FWgFgtBgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:KrHGPv5Smpt6DmUWuVZkxikdXcq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1228 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "\"C:\\Users\\Admin\\AppData\\Roaming\\y7zsZk\\irftp.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\1420\DWWIN.EXE cmd.exe File opened for modification C:\Windows\system32\1420\DWWIN.EXE cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3064 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\iNRtM.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\MSCFile\shell\open Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 rundll32.exe 3000 rundll32.exe 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2552 1228 Process not Found 28 PID 1228 wrote to memory of 2552 1228 Process not Found 28 PID 1228 wrote to memory of 2552 1228 Process not Found 28 PID 1228 wrote to memory of 2920 1228 Process not Found 29 PID 1228 wrote to memory of 2920 1228 Process not Found 29 PID 1228 wrote to memory of 2920 1228 Process not Found 29 PID 1228 wrote to memory of 2700 1228 Process not Found 30 PID 1228 wrote to memory of 2700 1228 Process not Found 30 PID 1228 wrote to memory of 2700 1228 Process not Found 30 PID 1228 wrote to memory of 2076 1228 Process not Found 32 PID 1228 wrote to memory of 2076 1228 Process not Found 32 PID 1228 wrote to memory of 2076 1228 Process not Found 32 PID 2076 wrote to memory of 1728 2076 cmd.exe 34 PID 2076 wrote to memory of 1728 2076 cmd.exe 34 PID 2076 wrote to memory of 1728 2076 cmd.exe 34 PID 1228 wrote to memory of 2248 1228 Process not Found 35 PID 1228 wrote to memory of 2248 1228 Process not Found 35 PID 1228 wrote to memory of 2248 1228 Process not Found 35 PID 1228 wrote to memory of 2540 1228 Process not Found 36 PID 1228 wrote to memory of 2540 1228 Process not Found 36 PID 1228 wrote to memory of 2540 1228 Process not Found 36 PID 1228 wrote to memory of 1524 1228 Process not Found 37 PID 1228 wrote to memory of 1524 1228 Process not Found 37 PID 1228 wrote to memory of 1524 1228 Process not Found 37 PID 1228 wrote to memory of 2904 1228 Process not Found 38 PID 1228 wrote to memory of 2904 1228 Process not Found 38 PID 1228 wrote to memory of 2904 1228 Process not Found 38 PID 1228 wrote to memory of 2940 1228 Process not Found 40 PID 1228 wrote to memory of 2940 1228 Process not Found 40 PID 1228 wrote to memory of 2940 1228 Process not Found 40 PID 2940 wrote to memory of 3068 2940 eventvwr.exe 41 PID 2940 wrote to memory of 3068 2940 eventvwr.exe 41 PID 2940 wrote to memory of 3068 2940 eventvwr.exe 41 PID 3068 wrote to memory of 3064 3068 cmd.exe 43 PID 3068 wrote to memory of 3064 3068 cmd.exe 43 PID 3068 wrote to memory of 3064 3068 cmd.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efb2a3a0a0a03f5078818c9108f43cb658f92aac0b7b9710f5eccd9e36bc028b.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
C:\Windows\system32\wpnpinst.exeC:\Windows\system32\wpnpinst.exe1⤵PID:2552
-
C:\Windows\system32\irftp.exeC:\Windows\system32\irftp.exe1⤵PID:2920
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\0UuSm.cmd1⤵PID:2700
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{62baf7d1-2421-76c3-d64f-48bbd6001acb}"1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{62baf7d1-2421-76c3-d64f-48bbd6001acb}"2⤵PID:1728
-
-
C:\Windows\system32\wx6deg.exeC:\Windows\system32\wx6deg.exe1⤵PID:2248
-
C:\Windows\system32\WerFaultSecure.exeC:\Windows\system32\WerFaultSecure.exe1⤵PID:2540
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:1524
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\yMc9M.cmd1⤵
- Drops file in System32 directory
PID:2904
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\iNRtM.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Bygyxkyzdvxj" /SC minute /MO 60 /TR "C:\Windows\system32\1420\DWWIN.EXE" /RL highest3⤵
- Creates scheduled task(s)
PID:3064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229B
MD5cd9b98a3c219821934bcb826e902d883
SHA1ce82761543f97252c813bf0cf0393e101a978cbc
SHA256f8b6a4ff2b6b209d5ac9bf4d63c3a57cf58ab81887251f0b24a5672c4106b7af
SHA5120348e8c0b8160cec65d13c050e4f1d4822b28abc295bf33a1b93b6eade446d51944b624f8859a826765d93c89c69a74ddd3a98563cc6a50feb7c60e41bbf1d1c
-
Filesize
504KB
MD55b2a45f9d09622b849de7e5e3650a60c
SHA1e0ded7f6271fd80f76e0c20e7deb1fac452938d0
SHA256501337b09e1a03fb5c4d377efd4ce5999b58db78f87dc1ebf9d2dd6bac9416a1
SHA51218924abd3ada9804f67e3020f8b3f07c08272f3266795716f508d169ed347457aa99193fec40490573830f1bc5bf785e6d0974261e111ee19e537c10f0c57c95
-
Filesize
500KB
MD5586b1e997edc3c1a3311338e6712cdfc
SHA1720a87fb5e063f953a295854a2d7fb90590853fd
SHA2565900144aed79d012c3ad7d286f908324f0f4178f2a454d2314bf6b479c264715
SHA5127581d6e7a48243624745ee9bc78f2f8e76dea692085b17bb8939f0491bf43f641137f8dfb136e1f176c5b03cdbc43bf1fbfbcc72375ba22f438e987828d06cea
-
Filesize
128B
MD564976466735181fcf044aaab1a2bc358
SHA1b08bb52a0fd48be2dc41e82979c9e8dc529e18af
SHA256747b56906f2c8ea2a8d04a7c8616d16b9b54cabce969e69782d4fd3595d07789
SHA512efe2709e02d873672e21f26af1b1755710a833390f548e68445e8ac0d700d856b8f63a69bb43baf67e8557e3b0c8818a4b4576089e6224cfa148fe3dc1bd57a8
-
Filesize
191B
MD53fef7b50249b28f1f3f6dfc8f17c1d81
SHA107ef88ad888bd425a99112984e48987e49db44ff
SHA25616b92b14c134507ebadfa72ba31b5eec9d718c47402c7050c2a658c571536b2e
SHA51297c3c58765018746fa1947feeacb1cc177fc60041a6c28e53d8f1541eea52b227496cbded4fd4a77299153588dc857adb7a09b59a4ce60b30c707277d3a61ae1
-
Filesize
870B
MD5ec0bd8003101ed818493fae0737f74bf
SHA109ba81349dd0988a4357deb6ef0bd56c607efa64
SHA2562cb67cf838977e06660c30a36ed54f84a5d4c9c729cc78914add1590f3a681e5
SHA51270dd6d680e1f876fd9239ecfdeeca383f9e641087cf0097afb3e3d01a8444d415a74b9a556c25811b628b2c7e4aa9fa0e096e17af4a25d2672d55c40a13fc554
-
Filesize
192KB
MD50cae1fb725c56d260bfd6feba7ae9a75
SHA1102ac676a1de3ec3d56401f8efd518c31c8b0b80
SHA256312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d
SHA512db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec