Analysis

  • max time kernel
    192s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 10:55

General

  • Target

    f8be25e77aaa73c5c7c3c7345c7881ee2a3f76d7233388cca41b448219761e15.dll

  • Size

    68KB

  • MD5

    7c0e6313c56b5bc829bc59c4829871c2

  • SHA1

    64a27b5e46e4406ef488a23304ceea9a70d833c9

  • SHA256

    f8be25e77aaa73c5c7c3c7345c7881ee2a3f76d7233388cca41b448219761e15

  • SHA512

    833479990c05344e8d833a9a07ebf5e87a8ccd00e0dae0d86e82f08050fec7190462e654652b8839596f2ce9b9adf918e2c400d2117d86b0d092018e89202fce

  • SSDEEP

    768:LtRZ0NkZKDHOZcBHCE2a/ZOh+xqQKzvu+avgKvo9jd9cDgupNNpQcJJ9N0h/f4A/:JR2vOyTb/M+nKzvuIOo1f4

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 8 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f8be25e77aaa73c5c7c3c7345c7881ee2a3f76d7233388cca41b448219761e15.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f8be25e77aaa73c5c7c3c7345c7881ee2a3f76d7233388cca41b448219761e15.dll,#1
      2⤵
      • Sets DLL path for service in the registry
      • Drops file in System32 directory
      PID:3520
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    PID:3084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\64to32.dll

    Filesize

    68KB

    MD5

    7c0e6313c56b5bc829bc59c4829871c2

    SHA1

    64a27b5e46e4406ef488a23304ceea9a70d833c9

    SHA256

    f8be25e77aaa73c5c7c3c7345c7881ee2a3f76d7233388cca41b448219761e15

    SHA512

    833479990c05344e8d833a9a07ebf5e87a8ccd00e0dae0d86e82f08050fec7190462e654652b8839596f2ce9b9adf918e2c400d2117d86b0d092018e89202fce

  • \??\c:\windows\SysWOW64\64to32.dll

    Filesize

    68KB

    MD5

    7c0e6313c56b5bc829bc59c4829871c2

    SHA1

    64a27b5e46e4406ef488a23304ceea9a70d833c9

    SHA256

    f8be25e77aaa73c5c7c3c7345c7881ee2a3f76d7233388cca41b448219761e15

    SHA512

    833479990c05344e8d833a9a07ebf5e87a8ccd00e0dae0d86e82f08050fec7190462e654652b8839596f2ce9b9adf918e2c400d2117d86b0d092018e89202fce