Analysis

  • max time kernel
    114s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    02-08-2020 09:05

General

  • Target

    bb1af121502e40a549135b72f34ad49d11cfbfa49b5cbcf549777549087fe751.dll

  • Size

    258KB

  • MD5

    9070256c0531a143da6ee6697b5aa352

  • SHA1

    54f313419abe2dd153b7d2e66f8270b2a459cd13

  • SHA256

    bb1af121502e40a549135b72f34ad49d11cfbfa49b5cbcf549777549087fe751

  • SHA512

    f9e22d2f730a699c4cde38b6bb35b16733864e17d3de109a667ebc3e8e057f6778ae5a62f597ffbde936cc8fc8b075814012890058364ee4a86ebb8649eeac40

Score
7/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Deletes itself
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    PID:1184
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb1af121502e40a549135b72f34ad49d11cfbfa49b5cbcf549777549087fe751.dll,#1
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    PID:1124

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-0-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB

  • memory/1184-1-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB

  • memory/1184-2-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB

  • memory/1184-3-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB

  • memory/1184-4-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB

  • memory/1184-5-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB

  • memory/1184-6-0x0000000001DA0000-0x0000000001DE7000-memory.dmp
    Filesize

    284KB