Analysis Overview
SHA256
b8e80b78c82888231dc9c122812a5f22222436fc85a82eaccbcd0f71cd3a9035
Threat Level: Likely malicious
The file b8e80b78c82888231dc9c122812a5f22222436fc85a82eaccbcd0f71cd3a9035 was found to be: Likely malicious.
Malicious Activity Summary
Modifies Shared Task Scheduler registry keys
Installs/modifies Browser Helper Object
Drops file in System32 directory
Unsigned PE
Modifies registry class
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-03 02:51
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-03 02:51
Reported
2024-06-03 02:53
Platform
win10v2004-20240426-en
Max time kernel
141s
Max time network
100s
Command Line
Signatures
Modifies Shared Task Scheduler registry keys
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{049D27C1-16AF-C15A-E27B-7C059F38C16A} | C:\Windows\SysWOW64\rundll32.exe | N/A |
Installs/modifies Browser Helper Object
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AF38C26B-B049-6B04-8C16-16AF49E27B04}\ | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AF38C26B-B049-6B04-8C16-16AF49E27B04} | C:\Windows\SysWOW64\rundll32.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\UNFYQU.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\UNFYQU.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File created | C:\Windows\SysWOW64\ASLDWZ.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\ASLDWZ.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF38C26B-B049-6B04-8C16-16AF49E27B04}\InprocServer32 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{049D27C1-16AF-C15A-E27B-7C059F38C16A} | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{049D27C1-16AF-C15A-E27B-7C059F38C16A}\InprocServer32\ = "C:\\Windows\\SysWow64\\ASLDWZ.dll" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF38C26B-B049-6B04-8C16-16AF49E27B04} | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF38C26B-B049-6B04-8C16-16AF49E27B04}\ | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF38C26B-B049-6B04-8C16-16AF49E27B04}\InprocServer32\ = "C:\\Windows\\SysWow64\\UNFYQU.dll" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF38C26B-B049-6B04-8C16-16AF49E27B04}\InprocServer32\ThreadingModel = "Apartment" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{049D27C1-16AF-C15A-E27B-7C059F38C16A}\ | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{049D27C1-16AF-C15A-E27B-7C059F38C16A}\InprocServer32 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{049D27C1-16AF-C15A-E27B-7C059F38C16A}\InprocServer32\ThreadingModel = "Apartment" | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2908 wrote to memory of 3012 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2908 wrote to memory of 3012 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2908 wrote to memory of 3012 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\b8e80b78c82888231dc9c122812a5f22222436fc85a82eaccbcd0f71cd3a9035.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\b8e80b78c82888231dc9c122812a5f22222436fc85a82eaccbcd0f71cd3a9035.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.90.14.23.in-addr.arpa | udp |
| US | 52.111.227.11:443 | tcp | |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
Files
memory/3012-0-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-1-0x0000000077A84000-0x0000000077A85000-memory.dmp
C:\Windows\SysWOW64\UNFYQU.dll
| MD5 | cea9c31d02c86ce0ccc8b22642b51254 |
| SHA1 | decdbb28fa2f756757b6d22821189222279d3fc5 |
| SHA256 | 1e2cff20bc0a5f94ed7c3594a777c1d7cc16a526b16d6bf09fbdabf96a659eb9 |
| SHA512 | 8c003b9f8d8d14f21b015fda66f34954b5a07732fb140c98a09e59aafea609e3a408950a139a1bf79b26b4aba3a4bdfd47e873e5f9c81f630bafb99b0d8b0efb |
memory/3012-12-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-13-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-14-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-15-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-16-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-17-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-18-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-19-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-20-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-21-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-22-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-23-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-24-0x0000000000610000-0x000000000066C000-memory.dmp
memory/3012-25-0x0000000000610000-0x000000000066C000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-03 02:51
Reported
2024-06-03 02:53
Platform
win7-20240220-en
Max time kernel
150s
Max time network
123s
Command Line
Signatures
Modifies Shared Task Scheduler registry keys
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\SharedTaskScheduler\{EDB98642-0ECA-B975-CA97-6420FDBA9753} | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler | C:\Windows\SysWOW64\rundll32.exe | N/A |
Installs/modifies Browser Helper Object
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{975320EC-A864-531F-6531-0ECA976431FD} | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{975320EC-A864-531F-6531-0ECA976431FD}\ | C:\Windows\SysWOW64\rundll32.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\L.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File created | C:\Windows\SysWOW64\Q.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\Q.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File created | C:\Windows\SysWOW64\L.dll | C:\Windows\SysWOW64\rundll32.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EDB98642-0ECA-B975-CA97-6420FDBA9753}\ | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EDB98642-0ECA-B975-CA97-6420FDBA9753}\InprocServer32 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EDB98642-0ECA-B975-CA97-6420FDBA9753}\InprocServer32\ThreadingModel = "Apartment" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{975320EC-A864-531F-6531-0ECA976431FD}\InprocServer32\ = "C:\\Windows\\SysWow64\\L.dll" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{975320EC-A864-531F-6531-0ECA976431FD}\InprocServer32\ThreadingModel = "Apartment" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EDB98642-0ECA-B975-CA97-6420FDBA9753} | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EDB98642-0ECA-B975-CA97-6420FDBA9753}\InprocServer32\ = "C:\\Windows\\SysWow64\\Q.dll" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{975320EC-A864-531F-6531-0ECA976431FD} | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{975320EC-A864-531F-6531-0ECA976431FD}\ | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{975320EC-A864-531F-6531-0ECA976431FD}\InprocServer32 | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2700 wrote to memory of 2228 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\b8e80b78c82888231dc9c122812a5f22222436fc85a82eaccbcd0f71cd3a9035.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\b8e80b78c82888231dc9c122812a5f22222436fc85a82eaccbcd0f71cd3a9035.dll,#1
Network
Files
memory/2228-0-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-1-0x00000000774B0000-0x00000000774B1000-memory.dmp
C:\Windows\SysWOW64\L.dll
| MD5 | cea9c31d02c86ce0ccc8b22642b51254 |
| SHA1 | decdbb28fa2f756757b6d22821189222279d3fc5 |
| SHA256 | 1e2cff20bc0a5f94ed7c3594a777c1d7cc16a526b16d6bf09fbdabf96a659eb9 |
| SHA512 | 8c003b9f8d8d14f21b015fda66f34954b5a07732fb140c98a09e59aafea609e3a408950a139a1bf79b26b4aba3a4bdfd47e873e5f9c81f630bafb99b0d8b0efb |
memory/2228-12-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-13-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-14-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-15-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-16-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-17-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-18-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-19-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-20-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-21-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-22-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-23-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-24-0x00000000006F0000-0x000000000074C000-memory.dmp
memory/2228-25-0x00000000006F0000-0x000000000074C000-memory.dmp