Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 15:05

General

  • Target

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe

  • Size

    95KB

  • MD5

    45aa1c9de6086daf7354d7eb8a92f280

  • SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

  • SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

  • SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • SSDEEP

    1536:9xp5dYmUcckwkJSUNUif6Rir0jDW1aSFByrOmoSN6lr/rVqpV5ozBPlvc8OAKLVJ:Lp53ykhJSUd6Rr/WQS3oBoSWr/rVqpb4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 22 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe
    "C:\Users\Admin\AppData\Local\Temp\85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Windows\SysWOW64\dl1l.exe
      C:\Windows\system32\dl1l.exe 1076 "C:\Users\Admin\AppData\Local\Temp\85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Windows\SysWOW64\dl1l.exe
        C:\Windows\system32\dl1l.exe 1152 "C:\Windows\SysWOW64\dl1l.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3604
        • C:\Windows\SysWOW64\dl1l.exe
          C:\Windows\system32\dl1l.exe 1124 "C:\Windows\SysWOW64\dl1l.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1424
          • C:\Windows\SysWOW64\dl1l.exe
            C:\Windows\system32\dl1l.exe 1128 "C:\Windows\SysWOW64\dl1l.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Windows\SysWOW64\dl1l.exe
              C:\Windows\system32\dl1l.exe 1132 "C:\Windows\SysWOW64\dl1l.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:2784
              • C:\Windows\SysWOW64\dl1l.exe
                C:\Windows\system32\dl1l.exe 1140 "C:\Windows\SysWOW64\dl1l.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:360
                • C:\Windows\SysWOW64\dl1l.exe
                  C:\Windows\system32\dl1l.exe 1136 "C:\Windows\SysWOW64\dl1l.exe"
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:976
                  • C:\Windows\SysWOW64\dl1l.exe
                    C:\Windows\system32\dl1l.exe 1144 "C:\Windows\SysWOW64\dl1l.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:1904
                    • C:\Windows\SysWOW64\dl1l.exe
                      C:\Windows\system32\dl1l.exe 1148 "C:\Windows\SysWOW64\dl1l.exe"
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:1288
                      • C:\Windows\SysWOW64\dl1l.exe
                        C:\Windows\system32\dl1l.exe 1164 "C:\Windows\SysWOW64\dl1l.exe"
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        PID:1984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • C:\Windows\SysWOW64\dl1l.exe

    Filesize

    95KB

    MD5

    45aa1c9de6086daf7354d7eb8a92f280

    SHA1

    d27938c2c3626ff8c927ea9dd06dddb73755114d

    SHA256

    85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3

    SHA512

    07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03

  • memory/360-152-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/976-155-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1288-161-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1424-143-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1632-146-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1904-158-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1984-164-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2784-149-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3604-139-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4180-135-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4876-140-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4876-136-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB