Analysis

  • max time kernel
    38s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 21:17

General

  • Target

    1d2674caf64e140bf0f5839e1e4e9b07682faf8de1fba825578d092dfaa81c6f.dll

  • Size

    272KB

  • MD5

    0b10ce6b9150c5d57a30dca758f81bb7

  • SHA1

    a6cccd890e612cea7865c9c4776a92372510d274

  • SHA256

    1d2674caf64e140bf0f5839e1e4e9b07682faf8de1fba825578d092dfaa81c6f

  • SHA512

    9ae915d8b089edc0ca82842e34beb6684a4e8cd32022484d317985e36fbbe58fdcbb9942889ecc63dbb8a1b8193c5883f66cec369f703a8f748202dc3f687fbe

  • SSDEEP

    3072:U4s8Ktl09idocdL9NGqtw0Umh8eq+qELoPnhUaFPmgRMNlPTGQQm6ytwZEsrYkKy:+l00RKzedi98gWNlPTGQQm6agrd0eh

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1d2674caf64e140bf0f5839e1e4e9b07682faf8de1fba825578d092dfaa81c6f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1d2674caf64e140bf0f5839e1e4e9b07682faf8de1fba825578d092dfaa81c6f.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1988-55-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB

  • memory/1988-56-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1988-57-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1988-60-0x00000000007A0000-0x00000000007A3000-memory.dmp

    Filesize

    12KB

  • memory/1988-59-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1988-58-0x00000000006E0000-0x0000000000723000-memory.dmp

    Filesize

    268KB