Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
235af3de0ac763c04428d827b5ee59e3f733951050137af6d6b6bba90d338c80.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
235af3de0ac763c04428d827b5ee59e3f733951050137af6d6b6bba90d338c80.dll
Resource
win10v2004-20240508-en
General
-
Target
235af3de0ac763c04428d827b5ee59e3f733951050137af6d6b6bba90d338c80.dll
-
Size
568KB
-
MD5
3d366c8734bf744294f50fe9aac17b1b
-
SHA1
e3765ed57be72a40a29d881ace7aaa18a0211b16
-
SHA256
235af3de0ac763c04428d827b5ee59e3f733951050137af6d6b6bba90d338c80
-
SHA512
81903034b3e88613d26807122d52f6a7614ae475ed5310a47d4fc23319adc9311dbd3b649d23b168e35e28f4d7277896beac6b53f8d7337490cb02ae77538b94
-
SSDEEP
6144:ei05kH9OyU2uv5SRf/FWgFgtBgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:xrHGPv5Smpt6DmUWuVZkxikdXcq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ic6uJuU\\raserver.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\5142\RdpSaUacHelper.exe cmd.exe File opened for modification C:\Windows\system32\5142\RdpSaUacHelper.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\LLS.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ms-settings Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Process not Found -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3444 wrote to memory of 3364 3444 Process not Found 89 PID 3444 wrote to memory of 3364 3444 Process not Found 89 PID 3444 wrote to memory of 5024 3444 Process not Found 90 PID 3444 wrote to memory of 5024 3444 Process not Found 90 PID 3444 wrote to memory of 1812 3444 Process not Found 91 PID 3444 wrote to memory of 1812 3444 Process not Found 91 PID 3444 wrote to memory of 392 3444 Process not Found 92 PID 3444 wrote to memory of 392 3444 Process not Found 92 PID 3444 wrote to memory of 4980 3444 Process not Found 94 PID 3444 wrote to memory of 4980 3444 Process not Found 94 PID 4980 wrote to memory of 4156 4980 cmd.exe 96 PID 4980 wrote to memory of 4156 4980 cmd.exe 96 PID 3444 wrote to memory of 4352 3444 Process not Found 97 PID 3444 wrote to memory of 4352 3444 Process not Found 97 PID 3444 wrote to memory of 1044 3444 Process not Found 98 PID 3444 wrote to memory of 1044 3444 Process not Found 98 PID 3444 wrote to memory of 2580 3444 Process not Found 100 PID 3444 wrote to memory of 2580 3444 Process not Found 100 PID 2580 wrote to memory of 3044 2580 fodhelper.exe 101 PID 2580 wrote to memory of 3044 2580 fodhelper.exe 101 PID 3044 wrote to memory of 2184 3044 cmd.exe 103 PID 3044 wrote to memory of 2184 3044 cmd.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\235af3de0ac763c04428d827b5ee59e3f733951050137af6d6b6bba90d338c80.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
C:\Windows\system32\RemotePosWorker.exeC:\Windows\system32\RemotePosWorker.exe1⤵PID:3364
-
C:\Windows\system32\dmcertinst.exeC:\Windows\system32\dmcertinst.exe1⤵PID:5024
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:1812
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\mKBMH7.cmd1⤵PID:392
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{662183c3-7773-ee8a-f0a9-0ccd273a9b7a}"1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{662183c3-7773-ee8a-f0a9-0ccd273a9b7a}"2⤵PID:4156
-
-
C:\Windows\system32\RdpSaUacHelper.exeC:\Windows\system32\RdpSaUacHelper.exe1⤵PID:4352
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\5V1wMd.cmd1⤵
- Drops file in System32 directory
PID:1044
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\LLS.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Fdxhngjjnp" /SC minute /MO 60 /TR "C:\Windows\system32\5142\RdpSaUacHelper.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD55110bea88eccef23c3c3ce0d99fe36ba
SHA11b81b14123db349a6e59432c85dfb5b0320c8a8a
SHA2564d8b68e1539a5bff3eaddd2aeb982182c5836279f4d3920aa84039605d71a785
SHA512b87d851089eb7c343c0093b8c21add5096ffa7958f34af2e72ec9d16d0521a9dd3378f554cdb1c079be4bf7aa3813f9b916dd2dc7e4ab6802fe885793bdc2422
-
Filesize
135B
MD51d871ee95ea6cd07f6109e2dd6e198ca
SHA1e107ecc62dc1da6047fdbc08d4229bd1571d2838
SHA25609626bbce68f8f4a331f75433ea93f635d02b3e891b0b5f37004f1dc6e1da58c
SHA512e49e1a638261670dd38a73b99c00a748acd21f5aa4baed7700dae0493b0f773c1c57732f51d9955599f484597fe486432ad2ab9fe6c4a789af358fafce59bdb4
-
Filesize
572KB
MD5c292780c80942ac5e635c5ec235bcf7c
SHA16590f5688f0b2fd4b43a783507cbd180e4e9d7ee
SHA2568c70a933adc53bd9281abcbcf6e882c7f95c9459f90260f9c366286c697f6a6e
SHA512465c486cf403d52eacc225bd69535b557c724500f96870f6e23432dd53b42bcb30b9f576baf54c0e88319259b9c2e185914382c2fdb0f27d9dcbf7babca202a4
-
Filesize
576KB
MD507dd290bee75be703310aaf2c2703d8e
SHA182818e5222cc22f170c54f7fe809a1056ee9cdb4
SHA2569999e15885044b4e77ef3f3ce293feed63bc75924cde114a984fb19215d50c97
SHA512aa91b429b4495034d17f997ed24e6e2e27eedceeed4d1c22a39e8fddae1e424daa73a01550d26aeb941090a6855cbaee857ac83fd82155d16bbcd43f8b3eb523
-
Filesize
236B
MD54b96b5e60b7e022b3a4bd6388cc69ae5
SHA13d5f6e89ca8472a1ad8c082c85dec7072e1d7ec3
SHA25689ade23dd94900c144a81393202f8f6fc518e1ef0b89d996c30d6135a8c1f0bd
SHA5121d3f70541da9834c026141d568e354dc97bbe0f987ed905f5c302533f91f58d2ea7c856216231e61e69cf8b9e9db9ed20137e47c4707e9304e908ee259c91210
-
Filesize
132KB
MD5d1841c6ee4ea45794ced131d4b68b60e
SHA14be6d2116060d7c723ac2d0b5504efe23198ea01
SHA25638732626242988cc5b8f97fe8d3b030d483046ef66ea90d7ea3607f1adc0600d
SHA512d8bad215872c5956c6e8acac1cd3ad19b85f72b224b068fb71cfd1493705bc7d3390853ba923a1aa461140294f8793247df018484a378e4f026c2a12cb3fa5c9
-
Filesize
918B
MD57b2914c3c85b4917c19fe3fee78aff64
SHA18a43c6b0423976b63455d803a0c1455fd96aeb69
SHA256a6dfb79e0a49471bf27b2cf41496c2c6961531d89bb651d7d56a3c6c5388b143
SHA5124fe16e36a09cd84f6aa36c98f43a306ff136c87853df9c5ba6b71962a1e30623c85ef3c26cfdbe66c169a6237e45ae4c84b0b7031670d7d3349a4a5ef26c2adb