Analysis

  • max time kernel
    152s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 05:47

General

  • Target

    a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll

  • Size

    214KB

  • MD5

    9ff0b0556ec293992264f1a5332dc74c

  • SHA1

    5d676a1262335fef80442c82b1d11f4c7552952c

  • SHA256

    a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b

  • SHA512

    3d3a805199898130137001202890347009e7c9d9c31dea43e3ae59767c76622f63c550d9677aeea8f434fbb179882e9a85978552737f881a243b0372fd168a1f

  • SSDEEP

    3072:VKomBsj+/XgWrtNgpI2ll8FZHj5nQFvc8UbWgoUV9E5lAuDHEAUFqNMH+t4SL8RJ:VoGWriIwqlAvHU/EPDvUFqe+R9Z9WIYZ

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a23b0ef1797fb8fbaad39b7ee7578cfc581cbce3154e3265a0e71bbcf9debd5b.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2008-54-0x0000000000000000-mapping.dmp

  • memory/2008-55-0x0000000075A81000-0x0000000075A83000-memory.dmp

    Filesize

    8KB

  • memory/2008-56-0x0000000010000000-0x00000000100A5000-memory.dmp

    Filesize

    660KB

  • memory/2008-57-0x0000000010000000-0x00000000100A5000-memory.dmp

    Filesize

    660KB