Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 08:31

General

  • Target

    b311f79236caf94bfb2b4d034182e3e4ef4b50facd1f8f4db93b0a31794b63ee.dll

  • Size

    37KB

  • MD5

    2e2e450d8f58b7df2d114fcb60e4a7e7

  • SHA1

    d02bf804a3a523b47fafa8f048adb9d0f6f639ac

  • SHA256

    b311f79236caf94bfb2b4d034182e3e4ef4b50facd1f8f4db93b0a31794b63ee

  • SHA512

    88e52429122bd9a78874ee0b2a4bfd4913fa11ed5c7ac66fa33924efe74fbf6ab200c07917d4bdbb0d43d7ab09d70dd1b73aee8be3a560fe5dbf3c024c6a7332

  • SSDEEP

    768:dD2KrzKWqGEpyKoMN8ldV6tjHahj7wI5OS3jqL:sv1oMy8jHaVEu5j

Score
1/10

Malware Config

Signatures

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b311f79236caf94bfb2b4d034182e3e4ef4b50facd1f8f4db93b0a31794b63ee.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b311f79236caf94bfb2b4d034182e3e4ef4b50facd1f8f4db93b0a31794b63ee.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Windows\SysWOW64\net.exe
        net stop winss
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:448
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop winss
          4⤵
            PID:2128
        • C:\Windows\SysWOW64\net.exe
          net stop OcHealthMon
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2508
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop OcHealthMon
            4⤵
              PID:380

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3456-136-0x0000000010000000-0x0000000010014000-memory.dmp

        Filesize

        80KB