Analysis

  • max time kernel
    110s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    16-12-2021 16:12

General

  • Target

    RofPaketsoka.dll

  • Size

    260KB

  • MD5

    bc65564fe8430d684cc54b5c1ab8f012

  • SHA1

    b75e38d7dd58f351bfb2d64333f6bafa20d2f199

  • SHA256

    f2871ca7c3a685006df8d50ce7707a0eb2850e0c9de74c2a3c19c3693623bef8

  • SHA512

    2ef56b15f12f717541c81e988e400c1e2b8ffe1bb650415f89e425aad5a1ad413182357c4a427b7ba94351433e7bc2a5f5962f584235de7417f099c7ff5baed4

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\RofPaketsoka.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\RofPaketsoka.dll,#1
      2⤵
        PID:3092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 628
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1048

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3092-117-0x0000000000000000-mapping.dmp