Analysis

  • max time kernel
    146s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 14:27

General

  • Target

    6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe

  • Size

    88KB

  • MD5

    69b3836af8283efae2c26218e05451fb

  • SHA1

    20aec039d5c587105a45d1b6963cbe680becc9fe

  • SHA256

    6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337

  • SHA512

    eae01a8424c61b5b920cee63cae625e41a1365767c7dd27fb2a0be378f3618ba69f54af43bbadf8d1cf98eea617a4bd114743d295633b413ec3f7fef1b1250f9

  • SSDEEP

    1536:CH1JTTU8QY1JpqhDcEfJEXuXS/ZMd0s63eC7wLf79ymBtUj/z/+QoeulWXW3IRXM:CvTTzQ1hDcExEiS/Za05Xc9yjjL/kN+y

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe
    "C:\Users\Admin\AppData\Local\Temp\6704a6783c48190a0339b9ce1e3970f1a2b6534e291d1f2cc0da882ff5107337.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Wilcolg.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Wilcolg.dll",iep
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:4328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Wilcolg.dll

    Filesize

    88KB

    MD5

    9efbddadd7ebb08e568a60aa6dc410df

    SHA1

    a17a9d88d48785fd6dedd895a0a845dec5b00560

    SHA256

    d08575eefd9ed06b4244f5e1b0e0b9fed300178ad32b0893121cdf89d9e9e3d1

    SHA512

    851ea28b0228695bf56193b3ba7274c7ceaf459c5b107f3529fea4e8c1e953772115925709e740d686d579c72e472ce677a81aba4a6bca70eb61162a339a0f95

  • C:\Users\Admin\AppData\Local\Wilcolg.dll

    Filesize

    88KB

    MD5

    9efbddadd7ebb08e568a60aa6dc410df

    SHA1

    a17a9d88d48785fd6dedd895a0a845dec5b00560

    SHA256

    d08575eefd9ed06b4244f5e1b0e0b9fed300178ad32b0893121cdf89d9e9e3d1

    SHA512

    851ea28b0228695bf56193b3ba7274c7ceaf459c5b107f3529fea4e8c1e953772115925709e740d686d579c72e472ce677a81aba4a6bca70eb61162a339a0f95

  • C:\Users\Admin\AppData\Local\Wilcolg.dll

    Filesize

    88KB

    MD5

    9efbddadd7ebb08e568a60aa6dc410df

    SHA1

    a17a9d88d48785fd6dedd895a0a845dec5b00560

    SHA256

    d08575eefd9ed06b4244f5e1b0e0b9fed300178ad32b0893121cdf89d9e9e3d1

    SHA512

    851ea28b0228695bf56193b3ba7274c7ceaf459c5b107f3529fea4e8c1e953772115925709e740d686d579c72e472ce677a81aba4a6bca70eb61162a339a0f95

  • memory/2412-132-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/2412-133-0x00000000005F1000-0x00000000005FF000-memory.dmp

    Filesize

    56KB

  • memory/4328-142-0x0000000002A11000-0x0000000002A1F000-memory.dmp

    Filesize

    56KB

  • memory/4816-137-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/4816-138-0x0000000002D91000-0x0000000002D9F000-memory.dmp

    Filesize

    56KB