Overview
overview
7Static
static
3D3DCompile...r3.dll
windows10-2004-x64
1PenImc_cor3.dll
windows7-x64
1PenImc_cor3.dll
windows10-2004-x64
1Presentati...r3.dll
windows7-x64
1Presentati...r3.dll
windows10-2004-x64
1YuukiPS.exe
windows7-x64
1YuukiPS.exe
windows10-2004-x64
7vcruntime140_cor3.dll
windows7-x64
1vcruntime140_cor3.dll
windows10-2004-x64
1wpfgfx_cor3.dll
windows7-x64
1wpfgfx_cor3.dll
windows10-2004-x64
1Analysis
-
max time kernel
61s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
D3DCompiler_47_cor3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
PenImc_cor3.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
PenImc_cor3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
PresentationNative_cor3.dll
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
PresentationNative_cor3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
YuukiPS.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
YuukiPS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
vcruntime140_cor3.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
vcruntime140_cor3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
wpfgfx_cor3.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
wpfgfx_cor3.dll
Resource
win10v2004-20240802-en
General
-
Target
D3DCompiler_47_cor3.dll
-
Size
4.7MB
-
MD5
a7349236212b0e5cec2978f2cfa49a1a
-
SHA1
5abb08949162fd1985b89ffad40aaf5fc769017e
-
SHA256
a05d04a270f68c8c6d6ea2d23bebf8cd1d5453b26b5442fa54965f90f1c62082
-
SHA512
c7ff4f9146fefedc199360aa04236294349c881b3865ebc58c5646ad6b3f83fca309de1173f5ebf823a14ba65e5ada77b46f20286d1ea62c37e17adbc9a82d02
-
SSDEEP
49152:FCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvpiD0N+YEzI4og/RfzHLeHTRhFRNS:EG2QCwmHXnog/pzHAo/A2L
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3836 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE 3836 EXCEL.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\D3DCompiler_47_cor3.dll,#11⤵PID:1644
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\WriteLimit.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262B
MD5298eee84147657a4af8252da49a72f65
SHA1d91c2a9246f237e261dac1a5f726f5750295ae28
SHA256bfb88020fd6a2d1b00131686205290a39abf63cb2379402a4092fb0f08c8f8d6
SHA512218bf7140d47c933c929824efb08d49149171cad71b1ac469f57a9e7f32ff889efb13ab7c16a34644700ab427385e581d17f0a9d73f34e13c52320c9971e8e2b