Analysis

  • max time kernel
    91s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 07:24

General

  • Target

    cd43f843b08ce09323cc6f4395dbc1101f69f6d969311fa97266332763b96f22.dll

  • Size

    560KB

  • MD5

    0a01f7b6a2c61d0c5d954b6356e410c0

  • SHA1

    8ad74235d121ebee894dab82358a83cd8f043271

  • SHA256

    cd43f843b08ce09323cc6f4395dbc1101f69f6d969311fa97266332763b96f22

  • SHA512

    7a9e8b06320113fc3351c29ae4db73da22a9a5c9b889f34a5f262cd57561e9fb26040712189d9f4cdc6db667180a1999179414a8f14805d386e35aab2e2dbc6f

  • SSDEEP

    12288:m9xyvwOR31YEWc/T6HHr6FMNiuhHpOBksE8lvyjLHRJJpHIz+TSFw2zUrIa4Xwe:qer1YXUOHL6FG6wzJbTm9z0Qwe

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cd43f843b08ce09323cc6f4395dbc1101f69f6d969311fa97266332763b96f22.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cd43f843b08ce09323cc6f4395dbc1101f69f6d969311fa97266332763b96f22.dll,#1
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\V220070411.EPE

    Filesize

    479KB

    MD5

    38332c2fb4f2c767ec9fba9ccc1e56ef

    SHA1

    d554b19be46912b9594169f745e7e3f91b008f97

    SHA256

    200686d518e3a034babe94968bcf2bfd86ec40d0df505a1877501306477522c6

    SHA512

    70362e97136e5861f13da5eacd359e8f4df4c0f61be18a138333fdce428a12c16507a3f97a6491839064d7e746ea5de857051a127c4c10609a726f32bf0a141e

  • memory/1664-132-0x0000000000000000-mapping.dmp

  • memory/1664-134-0x0000000010000000-0x00000000100D0000-memory.dmp

    Filesize

    832KB

  • memory/1664-135-0x0000000071120000-0x0000000071261000-memory.dmp

    Filesize

    1.3MB