Analysis
-
max time kernel
93s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 04:49
Behavioral task
behavioral1
Sample
abb60fa64cc1b173e54a03e540e0c830N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abb60fa64cc1b173e54a03e540e0c830N.dll
Resource
win10v2004-20240802-en
General
-
Target
abb60fa64cc1b173e54a03e540e0c830N.dll
-
Size
800KB
-
MD5
abb60fa64cc1b173e54a03e540e0c830
-
SHA1
38bf4cd33b3670eb06f5f4c8975324afacaa0172
-
SHA256
9164193137d18b31070961a933c1477dd6178a20828ed40e1035f14b5db34434
-
SHA512
12ff7085240f763bc5903ae2244f15fb10cd3038197a54d7fa1e53e3e2b8049a94dfd42c5a9f3f3384eff1bdb34d8d0ea8ed08ae3abe191efa629debe9ec21dc
-
SSDEEP
24576:Av9tS8CvloQ6bLoxRgrGtXtdo0Gkpbe77:AVU8Kl36b0CyXonMa77
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Modifies registry class 34 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Version\ = "1.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\VersionIndependentProgID\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msvidctl.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Programmable\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\0\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\FLAGS rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\FLAGS\ = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Version rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\VersionIndependentProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\ = "Owilisek" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\0\win64 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\InprocServer32\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\ProgID\ = "MSVidCtl.MSVidAudioRendererDevices.1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\TypeLib\ = "{350B4F29-8125-04E6-0881-E266354D04BF}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\ProgID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\FLAGS\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\VersionIndependentProgID\ = "MSVidCtl.MSVidAudioRendererDevices" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\ProgID\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Programmable rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\0\win64\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Implemented Categories\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\TypeLib\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Implemented Categories rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\0\win64\ = "c:\\Program Files\\Common Files\\Microsoft Shared\\OFFICE16\\LICLUA.EXE" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{350B4F29-8125-04E6-0881-E266354D04BF}\10.0\ = "LicLuaLib" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B686BBE0-A862-4782-BFBE-8BB87BBB809C}\Version\ rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2680 1152 rundll32.exe 83 PID 1152 wrote to memory of 2680 1152 rundll32.exe 83 PID 1152 wrote to memory of 2680 1152 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abb60fa64cc1b173e54a03e540e0c830N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abb60fa64cc1b173e54a03e540e0c830N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
PID:2680
-