Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 09:52
Behavioral task
behavioral1
Sample
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2.dll
Resource
win7-20240903-en
16 signatures
150 seconds
General
-
Target
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2.dll
-
Size
431KB
-
MD5
d37c84a801e443b067c8b7f41c072361
-
SHA1
00829d8a58c40dfd05e817adf2fee57f7d468806
-
SHA256
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2
-
SHA512
ac16ce66b86361fc6ce1a757a2229e42ef688f354684cf324401a908ce009c6cc00c9758c4a1cfd885d1716b2c0d8cd66dad28766c2d79a5925c7979baf3f1b7
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9y:IXivg1VCpZOCqxkOH7TBk
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 27 IoCs
description pid Process procid_target PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 PID 4716 created 616 4716 rundll32.exe 5 -
resource yara_rule behavioral2/memory/4716-0-0x0000000010000000-0x0000000010088000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4716 rundll32.exe 4716 rundll32.exe 4716 rundll32.exe 4716 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe Token: SeDebugPrivilege 4716 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4716 3012 rundll32.exe 83 PID 3012 wrote to memory of 4716 3012 rundll32.exe 83 PID 3012 wrote to memory of 4716 3012 rundll32.exe 83 PID 4716 wrote to memory of 916 4716 rundll32.exe 84 PID 4716 wrote to memory of 916 4716 rundll32.exe 84 PID 4716 wrote to memory of 916 4716 rundll32.exe 84 PID 4716 wrote to memory of 392 4716 rundll32.exe 85 PID 4716 wrote to memory of 392 4716 rundll32.exe 85 PID 4716 wrote to memory of 392 4716 rundll32.exe 85 PID 4716 wrote to memory of 1640 4716 rundll32.exe 86 PID 4716 wrote to memory of 1640 4716 rundll32.exe 86 PID 4716 wrote to memory of 1640 4716 rundll32.exe 86 PID 4716 wrote to memory of 1104 4716 rundll32.exe 87 PID 4716 wrote to memory of 1104 4716 rundll32.exe 87 PID 4716 wrote to memory of 1104 4716 rundll32.exe 87 PID 4716 wrote to memory of 2172 4716 rundll32.exe 88 PID 4716 wrote to memory of 2172 4716 rundll32.exe 88 PID 4716 wrote to memory of 2172 4716 rundll32.exe 88 PID 4716 wrote to memory of 4804 4716 rundll32.exe 89 PID 4716 wrote to memory of 4804 4716 rundll32.exe 89 PID 4716 wrote to memory of 4804 4716 rundll32.exe 89 PID 4716 wrote to memory of 4828 4716 rundll32.exe 90 PID 4716 wrote to memory of 4828 4716 rundll32.exe 90 PID 4716 wrote to memory of 4828 4716 rundll32.exe 90 PID 4716 wrote to memory of 4244 4716 rundll32.exe 91 PID 4716 wrote to memory of 4244 4716 rundll32.exe 91 PID 4716 wrote to memory of 4244 4716 rundll32.exe 91 PID 4716 wrote to memory of 4824 4716 rundll32.exe 92 PID 4716 wrote to memory of 4824 4716 rundll32.exe 92 PID 4716 wrote to memory of 4824 4716 rundll32.exe 92 PID 4716 wrote to memory of 1312 4716 rundll32.exe 93 PID 4716 wrote to memory of 1312 4716 rundll32.exe 93 PID 4716 wrote to memory of 1312 4716 rundll32.exe 93 PID 4716 wrote to memory of 3976 4716 rundll32.exe 94 PID 4716 wrote to memory of 3976 4716 rundll32.exe 94 PID 4716 wrote to memory of 3976 4716 rundll32.exe 94 PID 4716 wrote to memory of 4224 4716 rundll32.exe 95 PID 4716 wrote to memory of 4224 4716 rundll32.exe 95 PID 4716 wrote to memory of 4224 4716 rundll32.exe 95 PID 4716 wrote to memory of 4952 4716 rundll32.exe 96 PID 4716 wrote to memory of 4952 4716 rundll32.exe 96 PID 4716 wrote to memory of 4952 4716 rundll32.exe 96 PID 4716 wrote to memory of 4704 4716 rundll32.exe 97 PID 4716 wrote to memory of 4704 4716 rundll32.exe 97 PID 4716 wrote to memory of 4704 4716 rundll32.exe 97 PID 4716 wrote to memory of 388 4716 rundll32.exe 98 PID 4716 wrote to memory of 388 4716 rundll32.exe 98 PID 4716 wrote to memory of 388 4716 rundll32.exe 98 PID 4716 wrote to memory of 1804 4716 rundll32.exe 99 PID 4716 wrote to memory of 1804 4716 rundll32.exe 99 PID 4716 wrote to memory of 1804 4716 rundll32.exe 99 PID 4716 wrote to memory of 2988 4716 rundll32.exe 100 PID 4716 wrote to memory of 2988 4716 rundll32.exe 100 PID 4716 wrote to memory of 2988 4716 rundll32.exe 100 PID 4716 wrote to memory of 1588 4716 rundll32.exe 101 PID 4716 wrote to memory of 1588 4716 rundll32.exe 101 PID 4716 wrote to memory of 1588 4716 rundll32.exe 101 PID 4716 wrote to memory of 3136 4716 rundll32.exe 102 PID 4716 wrote to memory of 3136 4716 rundll32.exe 102 PID 4716 wrote to memory of 3136 4716 rundll32.exe 102 PID 4716 wrote to memory of 1268 4716 rundll32.exe 103 PID 4716 wrote to memory of 1268 4716 rundll32.exe 103 PID 4716 wrote to memory of 1268 4716 rundll32.exe 103 PID 4716 wrote to memory of 2992 4716 rundll32.exe 104
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:916
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:392
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1640
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1104
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:2172
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4804
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4828
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4244
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4824
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1312
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:3976
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4224
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4952
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4704
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:388
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1804
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:2988
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1588
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:3136
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1268
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:2992
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:1204
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4240
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4880
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4328
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:2608
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:4672
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2.dll,#12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716
-