Analysis

  • max time kernel
    83s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:06

General

  • Target

    c6bbcbd392e5828b0fd1130e4c27cf352415295b0428c6b1ce6707528cfa8502.dll

  • Size

    116KB

  • MD5

    37d43403b20d57d78f8c4c646519d37f

  • SHA1

    d8166955e745633324423508cdd4924d5e1af8da

  • SHA256

    c6bbcbd392e5828b0fd1130e4c27cf352415295b0428c6b1ce6707528cfa8502

  • SHA512

    2ad1ce6da0ec326fcbb6a759ac614b7e7bd6303c42e269c4405a82e5c7a8d8e2d1f6faf146fd7d176638a2c6d9f098236f83460c46252e2235ad88dd3eb45d13

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6bbcbd392e5828b0fd1130e4c27cf352415295b0428c6b1ce6707528cfa8502.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6bbcbd392e5828b0fd1130e4c27cf352415295b0428c6b1ce6707528cfa8502.dll,#1
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      PID:2768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads