Analysis

  • max time kernel
    60s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 05:54

General

  • Target

    b4265be68d9ae01b3a801773891dc80b1c9501ff43a9999c3b0a0bfa3b8809a8.dll

  • Size

    2.1MB

  • MD5

    ce4a1572a1c6c4aa5e5731d44f3a1db0

  • SHA1

    8cf9e66744745fad5928ed8406db339e01a75de6

  • SHA256

    b4265be68d9ae01b3a801773891dc80b1c9501ff43a9999c3b0a0bfa3b8809a8

  • SHA512

    1b98807d18ff14b537f34d0697eecb3e88b4f18f2a5f65169cae5c4d7aa1f8b8028f4c5935eec757e702863b7189d27c13b4886d2b41a5288821e316bfe68b88

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE ComRAT CnC Domain in DNS Lookup

    suricata: ET MALWARE ComRAT CnC Domain in DNS Lookup

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b4265be68d9ae01b3a801773891dc80b1c9501ff43a9999c3b0a0bfa3b8809a8.dll,#1
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\System32\cmd.exe
      /c "dir"
      2⤵
        PID:1668
      • C:\Windows\System32\cmd.exe
        /c "set"
        2⤵
          PID:1528
        • C:\Windows\System32\cmd.exe
          /c "ipconfig /all"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            3⤵
            • Gathers network information
            PID:1812
        • \??\c:\program files\internet explorer\iexplore.exe
          "c:\program files\internet explorer\iexplore.exe"
          2⤵
            PID:1972
          • C:\Windows\System32\calc.exe
            "C:\Windows\System32\calc.exe"
            2⤵
              PID:1204
            • \??\c:\program files\internet explorer\iexplore.exe
              "c:\program files\internet explorer\iexplore.exe"
              2⤵
                PID:568
              • C:\Windows\System32\calc.exe
                "C:\Windows\System32\calc.exe"
                2⤵
                  PID:1032
                • \??\c:\program files\internet explorer\iexplore.exe
                  "c:\program files\internet explorer\iexplore.exe"
                  2⤵
                    PID:268
                  • C:\Windows\System32\calc.exe
                    "C:\Windows\System32\calc.exe"
                    2⤵
                      PID:1504

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/1204-58-0x0000000000060000-0x0000000000061000-memory.dmp

                    Filesize

                    4KB

                  • memory/1204-60-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmp

                    Filesize

                    8KB

                  • memory/1972-78-0x0000000000060000-0x0000000000072000-memory.dmp

                    Filesize

                    72KB

                  • memory/1972-80-0x0000000000060000-0x0000000000072000-memory.dmp

                    Filesize

                    72KB