Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
736e3da2213e4b8203bb5c8c36adbf8713ac075cb1a8323bcea5f33edc5e3c6aN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
736e3da2213e4b8203bb5c8c36adbf8713ac075cb1a8323bcea5f33edc5e3c6aN.dll
Resource
win10v2004-20241007-en
General
-
Target
736e3da2213e4b8203bb5c8c36adbf8713ac075cb1a8323bcea5f33edc5e3c6aN.dll
-
Size
339KB
-
MD5
a3a922e97dfffb56401d8beb21c49ba0
-
SHA1
10ba1c4fe11f450a8efb7b00c69bb41cc4e18a75
-
SHA256
736e3da2213e4b8203bb5c8c36adbf8713ac075cb1a8323bcea5f33edc5e3c6a
-
SHA512
14012e6a53c030c6576ca437cbc82a9f38ebd8a97415250a6be8c49bfe586fc0c5d833be681c8980f2e406b1ffd20d464e9c39804bc041042eea1d1244aea212
-
SSDEEP
6144:xJ7D5RtYutKWXfsMWxbsFMTk8YnpjAycXdBkr:PbtYapX0yrXr
Malware Config
Signatures
-
Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\SharedTaskScheduler\{91808080-A2A2-5D5D-7F6E-080807F7F7E5} rundll32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F}\ rundll32.exe -
Drops file in System32 directory 4 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\PBNYKW.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\PBNYKW.dll rundll32.exe File created C:\Windows\SysWOW64\VHSEQC.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\VHSEQC.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91808080-A2A2-5D5D-7F6E-080807F7F7E5} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91808080-A2A2-5D5D-7F6E-080807F7F7E5}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91808080-A2A2-5D5D-7F6E-080807F7F7E5}\InprocServer32\ = "C:\\Windows\\SysWow64\\VHSEQC.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91808080-A2A2-5D5D-7F6E-080807F7F7E5}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91808080-A2A2-5D5D-7F6E-080807F7F7E5}\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3B3A2A2A-4C4C-F7F7-1918-A2A2A191919F}\InprocServer32\ = "C:\\Windows\\SysWow64\\PBNYKW.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1720 1964 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\736e3da2213e4b8203bb5c8c36adbf8713ac075cb1a8323bcea5f33edc5e3c6aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\736e3da2213e4b8203bb5c8c36adbf8713ac075cb1a8323bcea5f33edc5e3c6aN.dll,#12⤵
- Modifies Shared Task Scheduler registry keys
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD58a185f23f0c626b14b29410f13adf9a6
SHA100f479513e5e2d4c9524ee705d7ada50003ee379
SHA2567f56d273eb992c6b837614bb8c530e59b7bae2088efb4f4d2acd38bdbbdd5c01
SHA5124fc58d5481042560ebaf274ef903ee47d5163aa6388fa101fce03e3f287c6820faa51dc208a77de75d4dbf90e7ba1665f00ddac35b75c9625e356dac6bfad6bb