Analysis

  • max time kernel
    50s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-04-2022 13:05

General

  • Target

    3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0.dll

  • Size

    2.0MB

  • MD5

    19743d8e8590b5f644d452a9ddd77435

  • SHA1

    28c454042b155c4356c2a78b64c25ddf020b8eba

  • SHA256

    3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0

  • SHA512

    5743c1a3112ee13aefd30f8f3291a32b31e04782c23f03a64c3996d30022c6c5c0051f945450f814a0834758488eb9e0dc3481d706c7b643011cd06c19f8aa71

Score
1/10

Malware Config

Signatures

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0.dll,#1
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\System32\cmd.exe
      /c "dir"
      2⤵
        PID:4884
      • C:\Windows\System32\cmd.exe
        /c "set"
        2⤵
          PID:4300
        • C:\Windows\System32\cmd.exe
          /c "ipconfig /all"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4848
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            3⤵
            • Gathers network information
            PID:3864
        • \??\c:\program files\internet explorer\iexplore.exe
          "c:\program files\internet explorer\iexplore.exe"
          2⤵
            PID:4188
          • C:\Windows\System32\calc.exe
            "C:\Windows\System32\calc.exe"
            2⤵
              PID:5100
            • \??\c:\program files\internet explorer\iexplore.exe
              "c:\program files\internet explorer\iexplore.exe"
              2⤵
                PID:4872
              • C:\Windows\System32\calc.exe
                "C:\Windows\System32\calc.exe"
                2⤵
                  PID:988
                • \??\c:\program files\internet explorer\iexplore.exe
                  "c:\program files\internet explorer\iexplore.exe"
                  2⤵
                    PID:1420
                  • C:\Windows\System32\calc.exe
                    "C:\Windows\System32\calc.exe"
                    2⤵
                      PID:1696

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/4188-134-0x00000217E85B0000-0x00000217E85C3000-memory.dmp

                    Filesize

                    76KB