Resubmissions

27-10-2022 16:10

221027-tmrjwacggm 10

21-02-2022 16:53

220221-vecanabffq 8

Analysis

  • max time kernel
    62s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 16:10

General

  • Target

    msvcr170.dll

  • Size

    250KB

  • MD5

    6ac740ebf98df7217d31cb826a207af6

  • SHA1

    6bf6fc77b10f6700fa0b868f6d3515b495d1e1e0

  • SHA256

    2f11ca3dcc1d9400e141d8f3ee9a7a0d18e21908e825990f5c22119214fbb2f5

  • SHA512

    e0d57245047e3689f4804ed75dfcf9b1468473952a5a6bdab5ff164af1b3e5fc220ba0d737a53cb3f8318e10ef42c3ff5a5763487e2b10c785aab14eacbcde5c

  • SSDEEP

    6144:Lo77pPOYfVtaoP/IbI9ezw79SycUB0Xy:LolfHHPQ6Sywi

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcr170.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    PID:756

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/756-54-0x0000000077930000-0x0000000077AD9000-memory.dmp
    Filesize

    1.7MB

  • memory/756-55-0x0000000077930000-0x0000000077AD9000-memory.dmp
    Filesize

    1.7MB

  • memory/756-56-0x0000000077930000-0x0000000077AD9000-memory.dmp
    Filesize

    1.7MB