Analysis

  • max time kernel
    61s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    17-04-2022 21:02

General

  • Target

    78366B123438B7CD2F167E49623104B76A0E27334CE3F.dll

  • Size

    122KB

  • MD5

    948717a6d0102100a857555db2579f90

  • SHA1

    5dd65a1535b793f7c314b00f18e6a81f3ccb6fb8

  • SHA256

    78366b123438b7cd2f167e49623104b76a0e27334ce3f39b91a36abe8c67d665

  • SHA512

    eb2437d578e368e2accebf38fc75bf82138083b91b9b630651a78d72a1896dd538d249a64a34afdaf7bfec3da2b9ebd433a9d50c5bc3fe9b4c6add12493609cb

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\78366B123438B7CD2F167E49623104B76A0E27334CE3F.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\78366B123438B7CD2F167E49623104B76A0E27334CE3F.dll,#1
      2⤵
        PID:2688

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2688-130-0x0000000000000000-mapping.dmp