Analysis

  • max time kernel
    198s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 16:19

General

  • Target

    6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll

  • Size

    48KB

  • MD5

    45925067afcbe7d0c0c11f827f0e8ff0

  • SHA1

    eabc6f08fb08ee28fc277311b223f63936ad124b

  • SHA256

    6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8

  • SHA512

    6e4c096c7ef01b8b84efc62fc2d8caa3573ad841e8f7ee2d60ac49cb48dbcdd55f825f88e274692ee2b9447c1a2225256d6cd7abb6a81d5e5f5f43c89ccb0afa

  • SSDEEP

    768:hojY9PdJdMmJyj0Ml+oi/XSpSZbVfDQoWyHaojY9PoK:0mFJdMmJyDl+tVZioWyHjmgK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6dadd52d0abe2f87f1064203a3574389f23c68901dd6fbdaa6e3ec3bb79cf3d8.dll,#1
      2⤵
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Local\Temp\hrlF4FA.tmp
        C:\Users\Admin\AppData\Local\Temp\hrlF4FA.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:768
  • C:\Windows\SysWOW64\kequas.exe
    C:\Windows\SysWOW64\kequas.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:1164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hrlF4FA.tmp

    Filesize

    38KB

    MD5

    f0f40c080b0c9ac85edc1c147d99880f

    SHA1

    20d73c8122fa41fc2b2e084768792fc8670039d6

    SHA256

    13b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8

    SHA512

    b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654

  • C:\Users\Admin\AppData\Local\Temp\hrlF4FA.tmp

    Filesize

    38KB

    MD5

    f0f40c080b0c9ac85edc1c147d99880f

    SHA1

    20d73c8122fa41fc2b2e084768792fc8670039d6

    SHA256

    13b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8

    SHA512

    b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654

  • C:\Windows\SysWOW64\kequas.exe

    Filesize

    38KB

    MD5

    f0f40c080b0c9ac85edc1c147d99880f

    SHA1

    20d73c8122fa41fc2b2e084768792fc8670039d6

    SHA256

    13b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8

    SHA512

    b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654

  • C:\Windows\SysWOW64\kequas.exe

    Filesize

    38KB

    MD5

    f0f40c080b0c9ac85edc1c147d99880f

    SHA1

    20d73c8122fa41fc2b2e084768792fc8670039d6

    SHA256

    13b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8

    SHA512

    b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654

  • \Users\Admin\AppData\Local\Temp\hrlF4FA.tmp

    Filesize

    38KB

    MD5

    f0f40c080b0c9ac85edc1c147d99880f

    SHA1

    20d73c8122fa41fc2b2e084768792fc8670039d6

    SHA256

    13b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8

    SHA512

    b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654

  • \Users\Admin\AppData\Local\Temp\hrlF4FA.tmp

    Filesize

    38KB

    MD5

    f0f40c080b0c9ac85edc1c147d99880f

    SHA1

    20d73c8122fa41fc2b2e084768792fc8670039d6

    SHA256

    13b3387852f1a98ae69f0bae6af216047b0eae83e65712b46b16f2f670ece5f8

    SHA512

    b01f5b652f4c69656e3cd018ac5bb9adc4e79fc036afa7eb9ea217bb544248ccd19358d4cf4551030f2a52f0df7ad0aa3cb34024d0b69d7f92f9f189fe4ea654

  • \Windows\SysWOW64\hra33.dll

    Filesize

    46KB

    MD5

    340b3c849e4ae75e027b40e179522181

    SHA1

    5b95d15a903f2be144f84d6f1261817bd85ccb8e

    SHA256

    5e7dd39c1522a620f9a85def5b573b9ba7cda8e14e4a4bc1d48578c2ba70dd29

    SHA512

    1c56ecd4c408536b26456959d9e98ad81618ba526aba7c277028b187818a058239be7198a9f417f90a3390c2c3a33c462fcd355ad613a82655e6caba79469157

  • memory/944-55-0x00000000761E1000-0x00000000761E3000-memory.dmp

    Filesize

    8KB