Analysis

  • max time kernel
    146s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 19:27

General

  • Target

    file.dll

  • Size

    164KB

  • MD5

    7d113ca1ae3f5d652e95a7235bb5f500

  • SHA1

    ac1a058579d7fc2795b114e9f5b127d16c6cb8f2

  • SHA256

    e98671b2d66ed8e660d8653d19773ca46706a43c3d489b947df1fd4b0cefce41

  • SHA512

    80bb2ca4475afe8d9ce35c38ab4c25358f07aea28f7d1c7034c64e4cb17614760cfd836869b5dc7bb5834b8075178e2831c5a1741698262910836d1d83659a18

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#1
      2⤵
      • Enumerates connected drives
      PID:1796

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1796-0-0x0000000000000000-mapping.dmp