Analysis

  • max time kernel
    182s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:42

General

  • Target

    0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe

  • Size

    58KB

  • MD5

    50ec5eea49f541419f96483de88f42cf

  • SHA1

    2dc8e80e6193191112d01aa0978e40074451c666

  • SHA256

    0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6

  • SHA512

    b6e1af165e35b06fd832cd0e3615801a610d7f623625a6f1a2dcb67fdd3c27cd6fbf1d05a6f0b04a766b6f7bb3ea4c62234e351e38e921f0dbd60ad660f9dfe1

  • SSDEEP

    1536:/M3Re3bDCJHrooFriiqUTtDEJCh9SlIIlvZaus:U36CdHsgtP9gPZ0

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe
    "C:\Users\Admin\AppData\Local\Temp\0bd0321ef49903fa3be00621add69e18f2e13740bddcef52a5fd4e056bcdb0e6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\detend.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\detend.dll",iep
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:1520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\detend.dll

    Filesize

    58KB

    MD5

    73c261dc4181f3b7e34a6f46ef72364c

    SHA1

    b0019a4f75aef86dd8b5bc8ddcedf5dbe16e6f59

    SHA256

    acfa31be0b0cc2699e21f2148a5c753332c82a4f8d41078de0ba95d4a8a8ac3d

    SHA512

    c50c8c5dc94d56dfc2ebc1d75746cc385a8ea56266267686cd699d7bd72e21b8ac31c7a661db12a59ed986884be4e221962f9b06a8a23da045c0fe1829514074

  • C:\Users\Admin\AppData\Local\detend.dll

    Filesize

    58KB

    MD5

    73c261dc4181f3b7e34a6f46ef72364c

    SHA1

    b0019a4f75aef86dd8b5bc8ddcedf5dbe16e6f59

    SHA256

    acfa31be0b0cc2699e21f2148a5c753332c82a4f8d41078de0ba95d4a8a8ac3d

    SHA512

    c50c8c5dc94d56dfc2ebc1d75746cc385a8ea56266267686cd699d7bd72e21b8ac31c7a661db12a59ed986884be4e221962f9b06a8a23da045c0fe1829514074

  • C:\Users\Admin\AppData\Local\detend.dll

    Filesize

    58KB

    MD5

    73c261dc4181f3b7e34a6f46ef72364c

    SHA1

    b0019a4f75aef86dd8b5bc8ddcedf5dbe16e6f59

    SHA256

    acfa31be0b0cc2699e21f2148a5c753332c82a4f8d41078de0ba95d4a8a8ac3d

    SHA512

    c50c8c5dc94d56dfc2ebc1d75746cc385a8ea56266267686cd699d7bd72e21b8ac31c7a661db12a59ed986884be4e221962f9b06a8a23da045c0fe1829514074

  • memory/1520-152-0x00000000010F1000-0x00000000010FF000-memory.dmp

    Filesize

    56KB

  • memory/1520-146-0x0000000000000000-mapping.dmp

  • memory/1908-144-0x0000000002731000-0x000000000273F000-memory.dmp

    Filesize

    56KB

  • memory/1908-140-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/1908-137-0x0000000000000000-mapping.dmp

  • memory/1908-141-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/4996-132-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/4996-145-0x0000000002311000-0x000000000231F000-memory.dmp

    Filesize

    56KB

  • memory/4996-134-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/4996-135-0x0000000010001000-0x000000001000C000-memory.dmp

    Filesize

    44KB

  • memory/4996-133-0x0000000002311000-0x000000000231F000-memory.dmp

    Filesize

    56KB