Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    27-12-2021 08:51

General

  • Target

    download.dat.dll

  • Size

    205KB

  • MD5

    f1b9ce32bd51a386ad01b3c21562598a

  • SHA1

    c51d70e9c65c0efac222bba50995df8392d8d79d

  • SHA256

    bffe313600b5b3ed8962533c200d0c054f3e0e9db072e16472865f5319c8fae0

  • SHA512

    62b3069c3a5991a11ae7834439c7ee77ecfa947cdc3a457bbfa313c338069319dce184855143f702fc6fa0a5b266bd31bf4a8910630838418261899a33868ffc

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\download.dat.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\download.dat.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 232
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-57-0x0000000000000000-mapping.dmp
  • memory/1368-59-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/1680-55-0x0000000000000000-mapping.dmp
  • memory/1680-56-0x0000000075AC1000-0x0000000075AC3000-memory.dmp
    Filesize

    8KB