Analysis
-
max time kernel
66s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
246c6ae2cd80e7f094414177fd7d24fe94005cdd4a52f116e3645ab68863620dN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
246c6ae2cd80e7f094414177fd7d24fe94005cdd4a52f116e3645ab68863620dN.dll
Resource
win10v2004-20241007-en
General
-
Target
246c6ae2cd80e7f094414177fd7d24fe94005cdd4a52f116e3645ab68863620dN.dll
-
Size
137KB
-
MD5
0da72c05d3b22e39d88018f37b59bc90
-
SHA1
9d48a15eb10793523a84df18cb99b811c2d9389a
-
SHA256
246c6ae2cd80e7f094414177fd7d24fe94005cdd4a52f116e3645ab68863620d
-
SHA512
b63a6e00750730936bb4b1c28f1888d210e0f66ee8c4010cc8d55618954ae2c692094bd163d7353b0b49a0a71b1dac002a89498da355fd6e9d4208cc78bb7d43
-
SSDEEP
3072:IR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuT:d25GgFny61mra1
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Port Monitors 1 TTPs 2 IoCs
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor\Driver = "scsimon.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Spooler\ImagePath = "Spoolsv.exe" rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\com\comb.dll rundll32.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\AppPatch\ComBack.Dll rundll32.exe File created C:\Windows\AppPatch\ComBack.Dll rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2740 2736 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2736 2316 rundll32.exe rundll32.exe PID 2736 wrote to memory of 2740 2736 rundll32.exe WerFault.exe PID 2736 wrote to memory of 2740 2736 rundll32.exe WerFault.exe PID 2736 wrote to memory of 2740 2736 rundll32.exe WerFault.exe PID 2736 wrote to memory of 2740 2736 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\246c6ae2cd80e7f094414177fd7d24fe94005cdd4a52f116e3645ab68863620dN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\246c6ae2cd80e7f094414177fd7d24fe94005cdd4a52f116e3645ab68863620dN.dll,#12⤵
- Boot or Logon Autostart Execution: Port Monitors
- Sets service image path in registry
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 2283⤵
- Program crash
PID:2740
-
-