Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 03:56
Behavioral task
behavioral1
Sample
8d2882ede2ff875292739f125a8f3290N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d2882ede2ff875292739f125a8f3290N.exe
Resource
win10v2004-20240709-en
General
-
Target
8d2882ede2ff875292739f125a8f3290N.exe
-
Size
57KB
-
MD5
8d2882ede2ff875292739f125a8f3290
-
SHA1
fb8d53da512f755bd617e2a4d418d07c1d8465e6
-
SHA256
6372eff8ffd9f871a8763263cc240387c321db5cdcf1e28e2d61d1f5c15092bd
-
SHA512
6fe8e54cfda0633f5c06bc600bcf727706d11ce1f40ea0e8c8c33376d50a007e4a8625656c1c1b220207df81d35894f3002dff8bf6d365970909ae5d0c835a7e
-
SSDEEP
1536:J5Vtu7dTkk3fFOMsbybXM/1nd20efLLTUq3wSOwwck/iXr7NFD0:JnMlkUJ4oi180aUFrck/ur73
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1896 rundll32.exe -
resource yara_rule behavioral2/memory/1004-0-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral2/memory/1004-5-0x0000000000400000-0x0000000000447000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3PMmUpdate = "rundll32 \"C:\\Windows\\Update.dll\",Main" 8d2882ede2ff875292739f125a8f3290N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Update.dll 8d2882ede2ff875292739f125a8f3290N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d2882ede2ff875292739f125a8f3290N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1004 wrote to memory of 1896 1004 8d2882ede2ff875292739f125a8f3290N.exe 84 PID 1004 wrote to memory of 1896 1004 8d2882ede2ff875292739f125a8f3290N.exe 84 PID 1004 wrote to memory of 1896 1004 8d2882ede2ff875292739f125a8f3290N.exe 84 PID 1004 wrote to memory of 4208 1004 8d2882ede2ff875292739f125a8f3290N.exe 85 PID 1004 wrote to memory of 4208 1004 8d2882ede2ff875292739f125a8f3290N.exe 85 PID 1004 wrote to memory of 4208 1004 8d2882ede2ff875292739f125a8f3290N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d2882ede2ff875292739f125a8f3290N.exe"C:\Users\Admin\AppData\Local\Temp\8d2882ede2ff875292739f125a8f3290N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\Update.dll",Main2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\\KB20312.bat"2⤵
- System Location Discovery: System Language Discovery
PID:4208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231B
MD550fbad6eb03f2e07ac7ab44c3730ac62
SHA15d64672189e0eccb28d41e8107668217e1cc2b71
SHA2560530bfc42b1535f46a1a7c3411db2f3a352e84a13a0164eb944cc54fa1e4f744
SHA5128f726bd0d66d15fcc1bbe211e1708a16813897205b1c786a49d56fa37a5e773e6dcd06bd25351abe3662e504e02f028b737e5590170e597ea639fd38783fd89a
-
Filesize
252KB
MD577f9a0c53d0b18a9eb12cd62e9bc602f
SHA1deba59873e9d749374aa67c3be18c27924fa5a03
SHA256346679df2dbf08c448770ba5cbff751541179018f509d6a56193d3580e86dfb8
SHA5125e36d88f0a4d534189a0ddb73739d187296e3c2b43b6d3af2f7724972d4f5566be4485a83a61b151417fe6325c5b920d55ec2a1c0ef4d7a24d6ada54912b5407