Analysis

  • max time kernel
    185s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 06:21

General

  • Target

    c6a6e8fb770c9d9ba417208c828873fb74170417d18d5e15c4b37792a344e812.dll

  • Size

    435KB

  • MD5

    09400ce5661a66203f972b62f555d38b

  • SHA1

    baeff48d5b45fa207079a23a6425f4d956731b2e

  • SHA256

    c6a6e8fb770c9d9ba417208c828873fb74170417d18d5e15c4b37792a344e812

  • SHA512

    8469c11f811bb97b9c85ba1e4edfc464db8842205b00cff7249cbb39a8c73c7af0825f7fe75a4c58f43bed1f653d9331b71a6101f102989e9f5bc5a6b33c65e7

  • SSDEEP

    12288:rXVQ5IHfzePx36jh7d60KzHBJ8If3qNctO3CwZXhhzVwvl:rC5enZQ4IfjtiC2hhid

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 10 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6a6e8fb770c9d9ba417208c828873fb74170417d18d5e15c4b37792a344e812.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6a6e8fb770c9d9ba417208c828873fb74170417d18d5e15c4b37792a344e812.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      PID:4280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads