Malware Analysis Report

2024-10-16 06:27

Sample ID 220201-trdtkshga9
Target 07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84
SHA256 07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84
Tags
ta505
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84

Threat Level: Known bad

The file 07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84 was found to be: Known bad.

Malicious Activity Summary

ta505

TA505

Blocklisted process makes network request

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-02-01 16:17

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-02-01 16:17

Reported

2022-02-02 06:57

Platform

win7-en-20211208

Max time kernel

120s

Max time network

146s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84.dll,#1

Signatures

TA505

ta505

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 windows-office365.com udp
US 194.195.211.26:443 windows-office365.com tcp

Files

memory/1616-55-0x0000000000280000-0x0000000000283000-memory.dmp

memory/1616-56-0x0000000000390000-0x0000000000391000-memory.dmp

memory/1616-57-0x0000000074E50000-0x0000000074EA8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-02-01 16:17

Reported

2022-02-02 06:57

Platform

win10v2004-en-20220112

Max time kernel

72s

Max time network

167s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84.dll,#1

Signatures

TA505

ta505

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\07be5d876aa45fd4d6f68a7c3ffa9e0a67f4d3d5f557309e5621334ffea74b84.dll,#1

Network

Country Destination Domain Proto
NL 104.80.224.57:443 tcp
IE 40.126.31.4:443 tcp
BE 8.238.110.126:80 tcp
BE 8.238.110.126:80 tcp
US 8.8.8.8:53 settings-win.data.microsoft.com udp
US 52.167.249.196:443 settings-win.data.microsoft.com tcp
US 8.8.8.8:53 windows-office365.com udp
US 194.195.211.26:443 windows-office365.com tcp
NL 92.123.77.43:80 tcp
US 72.21.91.29:80 tcp
US 72.21.91.29:80 tcp

Files

memory/2164-131-0x000001C52D470000-0x000001C52D471000-memory.dmp

memory/2164-130-0x000001C52D460000-0x000001C52D463000-memory.dmp

memory/2164-132-0x0000000072E20000-0x0000000072E78000-memory.dmp