Analysis

  • max time kernel
    44s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-07-2020 13:24

General

  • Target

    kpryt.bin.dll

  • Size

    554KB

  • MD5

    5c09c68b5bb3996f903218bc0e101025

  • SHA1

    d566450d11dff5ac3611c4215b28fef2a14a0d8c

  • SHA256

    21989a16f64302716a565599f469f5a97fb4a1b14ff6ed1896d2650866e12d6c

  • SHA512

    fd83ff5d4514629fabf2e3d88a536604b235c9f48d756816829650737687b73ec7ddc98782771720b2d9c843764f7893e7f3bf6f7f9bbdad1958cce53d9658b9

Score
10/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs
  • Blacklisted process makes network request 3 IoCs
  • Donot APT Downloader

    A downloader used by Donot APT group to download further modules.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\kpryt.bin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\kpryt.bin.dll,#1
      2⤵
      • Blacklisted process makes network request
      • Modifies system certificate store
      PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-0-0x0000000000000000-mapping.dmp