Analysis

  • max time kernel
    191s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 20:37

General

  • Target

    ee13f57ab03be1aba271772e54d2e900a03643cd500d2b7dfbbdc54cbfd562b2.dll

  • Size

    61KB

  • MD5

    258ab919ec9ea4bc2d762e08c4e00a03

  • SHA1

    451bed5855aec65514e70356eeba142fa658014a

  • SHA256

    ee13f57ab03be1aba271772e54d2e900a03643cd500d2b7dfbbdc54cbfd562b2

  • SHA512

    ab3c62cb8f45c9da7543eb875bfe905592fe4a0f09108bdc50161ed0fce1693324a667d89eed4dd0e693eda40d5b494f2f79ffcbb0445b53918ec0f3cc2dafe1

  • SSDEEP

    768:p+wwpmhOBHrSoPCFvQMQyA5WEEN1GXgY+JN1KUfun+71Fc4vkaSoUMmQlxkIT:p+w3hS+5TQyA5W3Gw3b7Wni1FVvkuSI

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee13f57ab03be1aba271772e54d2e900a03643cd500d2b7dfbbdc54cbfd562b2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee13f57ab03be1aba271772e54d2e900a03643cd500d2b7dfbbdc54cbfd562b2.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\ee13f57ab03be1aba271772e54d2e900a03643cd500d2b7dfbbdc54cbfd562b2.dll",iep
        3⤵
          PID:4288

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3052-132-0x0000000000000000-mapping.dmp
    • memory/3052-133-0x0000000010000000-0x0000000010012000-memory.dmp
      Filesize

      72KB

    • memory/3052-135-0x0000000010001000-0x000000001000D000-memory.dmp
      Filesize

      48KB

    • memory/3052-134-0x0000000010000000-0x0000000010012000-memory.dmp
      Filesize

      72KB

    • memory/3052-137-0x0000000002D51000-0x0000000002D5F000-memory.dmp
      Filesize

      56KB

    • memory/4288-138-0x0000000000000000-mapping.dmp
    • memory/4288-143-0x0000000000E51000-0x0000000000E5F000-memory.dmp
      Filesize

      56KB