Analysis

  • max time kernel
    118s
  • max time network
    175s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:38

General

  • Target

    8a7676a1c973d53626bc8e877861cb2a4b7021369097b0f83b11f0569748ab32.dll

  • Size

    164KB

  • MD5

    76a006d8c40c2a1eca3d5465edaeec52

  • SHA1

    0b9ea08762a974f87948afa8ef85596ee03f8b97

  • SHA256

    8a7676a1c973d53626bc8e877861cb2a4b7021369097b0f83b11f0569748ab32

  • SHA512

    985da96f2641e192f1c0f0080e9e69096ab1af24f0ef6e71dd0a10fa3b5a7c3b61c66ef0631ed04a5c98b0cd270fb3b696f2f6c3997449e1bcec33f0722b8e64

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a7676a1c973d53626bc8e877861cb2a4b7021369097b0f83b11f0569748ab32.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a7676a1c973d53626bc8e877861cb2a4b7021369097b0f83b11f0569748ab32.dll,#1
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      PID:480

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads