Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 18:09

General

  • Target

    f24b7c7f0898adf7000ea72688a20f172f114bb490d34d23909a695cb7bb1f34.dll

  • Size

    402KB

  • MD5

    60147f59e4c0179c39148067d2446133

  • SHA1

    4b0c6e954827b4c1b01a42c1256cbf75894c9de8

  • SHA256

    f24b7c7f0898adf7000ea72688a20f172f114bb490d34d23909a695cb7bb1f34

  • SHA512

    c700d0d6428cdac9dcc92ec71e323cd29e6874119378f0922607ccc0dd276f4cd1d367c7732edff2cdf2cd5b06bccba71c24272bb0bab88b1459e79fe45c78c4

  • SSDEEP

    12288:TA/O2c4Faj+5SLD6iX73pqhbL66gvNdHo:TA/Raj+ULDF73ebL66qNdI

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 9 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f24b7c7f0898adf7000ea72688a20f172f114bb490d34d23909a695cb7bb1f34.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f24b7c7f0898adf7000ea72688a20f172f114bb490d34d23909a695cb7bb1f34.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1564-55-0x0000000075681000-0x0000000075683000-memory.dmp

    Filesize

    8KB