Analysis

  • max time kernel
    39s
  • max time network
    49s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 01:18

General

  • Target

    E3-20210112_221455.dll

  • Size

    336KB

  • MD5

    d929734ca14dd60e9ff5f00ddeccb714

  • SHA1

    0527b4252950053b2d20d6b988812e1ccf6706ad

  • SHA256

    25cfb875f3580ad86963bb531ec75f24dc13c9a9c215cb35afcf78b54e0c3de5

  • SHA512

    4317a7f72081cf42734d36aae365206f00b740a687c088d51aeda4b008c60ed01ebc362386969dee74e9a35df382a8ffdab18de4100d3613c65924f9bfed942b

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\E3-20210112_221455.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\E3-20210112_221455.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Wnrmmkdac\zyuiqxcn.vva",ShowDialogA
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        PID:3444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3444-3-0x0000000000000000-mapping.dmp

  • memory/4792-2-0x0000000000000000-mapping.dmp