Analysis

  • max time kernel
    36s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 13:35

General

  • Target

    7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll

  • Size

    128KB

  • MD5

    a5b4091f4a0eec54ee9a1e4113e7d6b0

  • SHA1

    c255b0c8fead9141874f9b9af9cbfc0922dc83c4

  • SHA256

    7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3

  • SHA512

    b4673838b694e53a3026af45200fc3e524e6c636f7a14d2001165d0d17e62bcbe3804ea333cabcf5db254353542c21751c10485d31d690a22f688da3c723449a

  • SSDEEP

    1536:mq1Jn6+QfGmUjwJTlvRqJ52l1AiIcuOkCF/TIETdPoucKjEOn0ADRKSvR1:N3EGT83MLA1iDbYTfhoucEx0AVR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 544
        3⤵
        • Program crash
        PID:632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/880-55-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB