Analysis

  • max time kernel
    152s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 04:17

General

  • Target

    7d865dac017dc32279a1e8e64b6310870088821e412cc47f9a7a917b43a26f72.dll

  • Size

    29KB

  • MD5

    5c82817b5b4ea12ea05d1bc1d6eaead9

  • SHA1

    a8cfac271e9c36f0d30b577dae19e1c948550e3b

  • SHA256

    7d865dac017dc32279a1e8e64b6310870088821e412cc47f9a7a917b43a26f72

  • SHA512

    51f1a0d576e1a8cc2e054228d59fbda5026ce83f26ea97148b1aecad21fcd2e29f60d371f358b1b2814fe1e581a8b9989e6d725eb0d06bb90b93cf6f0fdc4645

  • SSDEEP

    768:pDdabwEogyKmNCj4jGsmSfuwKwmjZ3kp8eMEvE1gdjYL:pDcbwEogyx68pvmN3kCTEc1gxYL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d865dac017dc32279a1e8e64b6310870088821e412cc47f9a7a917b43a26f72.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d865dac017dc32279a1e8e64b6310870088821e412cc47f9a7a917b43a26f72.dll,#1
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 "C:\Windows\msocx.dll",_RunAs@16
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\msocx.dll

    Filesize

    29KB

    MD5

    5c82817b5b4ea12ea05d1bc1d6eaead9

    SHA1

    a8cfac271e9c36f0d30b577dae19e1c948550e3b

    SHA256

    7d865dac017dc32279a1e8e64b6310870088821e412cc47f9a7a917b43a26f72

    SHA512

    51f1a0d576e1a8cc2e054228d59fbda5026ce83f26ea97148b1aecad21fcd2e29f60d371f358b1b2814fe1e581a8b9989e6d725eb0d06bb90b93cf6f0fdc4645

  • C:\Windows\msocx.dll

    Filesize

    29KB

    MD5

    5c82817b5b4ea12ea05d1bc1d6eaead9

    SHA1

    a8cfac271e9c36f0d30b577dae19e1c948550e3b

    SHA256

    7d865dac017dc32279a1e8e64b6310870088821e412cc47f9a7a917b43a26f72

    SHA512

    51f1a0d576e1a8cc2e054228d59fbda5026ce83f26ea97148b1aecad21fcd2e29f60d371f358b1b2814fe1e581a8b9989e6d725eb0d06bb90b93cf6f0fdc4645

  • memory/220-134-0x0000000000000000-mapping.dmp

  • memory/220-137-0x0000000010000000-0x0000000010052000-memory.dmp

    Filesize

    328KB

  • memory/220-139-0x0000000010000000-0x0000000010052000-memory.dmp

    Filesize

    328KB

  • memory/1076-132-0x0000000000000000-mapping.dmp

  • memory/1076-133-0x0000000010000000-0x0000000010052000-memory.dmp

    Filesize

    328KB

  • memory/1076-138-0x0000000010000000-0x0000000010052000-memory.dmp

    Filesize

    328KB