Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
cd79ecfd604545de95e763d8e09bdaa7ecced7098bd8907c221152d72f3b4bffN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cd79ecfd604545de95e763d8e09bdaa7ecced7098bd8907c221152d72f3b4bffN.dll
Resource
win10v2004-20240802-en
General
-
Target
cd79ecfd604545de95e763d8e09bdaa7ecced7098bd8907c221152d72f3b4bffN.dll
-
Size
423KB
-
MD5
5adba8077e327d248f2fa339497e50d0
-
SHA1
e438607093f3bc6d9131258675f89d6f0ecf92ee
-
SHA256
cd79ecfd604545de95e763d8e09bdaa7ecced7098bd8907c221152d72f3b4bff
-
SHA512
624c375b6edbc5369b8d2729552b417cf524cc4cc0db3c41fee0c3b7296d3cd45482aaff2b0c866a41319b2e442d6d182ff2eeb4b8fa40dd822cdd9fe6a5ffce
-
SSDEEP
6144:8EIbbfrMlP50eWNgnmKsqRykTIpGm6DNvysnUsAhwFTKLPQltrBV0xHbo/EKqn0e:8Dbz+2eWNgbZRyj9
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
226
-
token
xehook226312823143720
Signatures
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3916 set thread context of 3812 3916 rundll32.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3812 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4884 wrote to memory of 3916 4884 rundll32.exe 82 PID 4884 wrote to memory of 3916 4884 rundll32.exe 82 PID 4884 wrote to memory of 3916 4884 rundll32.exe 82 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83 PID 3916 wrote to memory of 3812 3916 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd79ecfd604545de95e763d8e09bdaa7ecced7098bd8907c221152d72f3b4bffN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd79ecfd604545de95e763d8e09bdaa7ecced7098bd8907c221152d72f3b4bffN.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-