Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 13:35

General

  • Target

    7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll

  • Size

    128KB

  • MD5

    a5b4091f4a0eec54ee9a1e4113e7d6b0

  • SHA1

    c255b0c8fead9141874f9b9af9cbfc0922dc83c4

  • SHA256

    7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3

  • SHA512

    b4673838b694e53a3026af45200fc3e524e6c636f7a14d2001165d0d17e62bcbe3804ea333cabcf5db254353542c21751c10485d31d690a22f688da3c723449a

  • SSDEEP

    1536:mq1Jn6+QfGmUjwJTlvRqJ52l1AiIcuOkCF/TIETdPoucKjEOn0ADRKSvR1:N3EGT83MLA1iDbYTfhoucEx0AVR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll,#1
      2⤵
        PID:1724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads