Analysis

  • max time kernel
    224s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 14:29

General

  • Target

    aa1ed18cf5df1858a8c933b97e4832baa19a239130e101907bedb61879712c42.dll

  • Size

    22KB

  • MD5

    9e33fa28c9f3991dea57e0831366371e

  • SHA1

    923732f918748371945abbd1dd3b90fc639c4951

  • SHA256

    aa1ed18cf5df1858a8c933b97e4832baa19a239130e101907bedb61879712c42

  • SHA512

    61e2413417ab759df739d0de5b4f3192d59a7077e8ef48b9692124cf789219fa12659a5c575c192c606789bdb5ac7102cdb5c48f73525d4e1e40c80a62685f44

  • SSDEEP

    384:W69cZ6z12M+ZxdKFaE5H25aRnfAw89Ug6/axudSGgI/+Jo8YFGqP5vXWvwWu:W69a6h2ddK/5H20Yw89weudZgIAYFp50

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa1ed18cf5df1858a8c933b97e4832baa19a239130e101907bedb61879712c42.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa1ed18cf5df1858a8c933b97e4832baa19a239130e101907bedb61879712c42.dll,#1
      2⤵
      • Drops file in Drivers directory
      • Sets DLL path for service in the registry
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 268
        3⤵
        • Program crash
        PID:892
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:1788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\drivers\MgicRc.sys

    Filesize

    2KB

    MD5

    058bf2e0728e3d36308bf49ca10b9072

    SHA1

    ed9ca10d9ca36c94f065401c0c6ee5573a7f7de6

    SHA256

    9a5ae5bf51913d9c8e84dae09636d09b83359547cc9efd7acaa5e13ec6e9bf70

    SHA512

    e3ceadf9a09c2df7af451a7bc53c8d2419e3c94e478ad02436fbdec661304713a86c86780a6361a01ee2afece1917b92e5043580e2e697eaf05a73fb18fd26c2

  • \??\c:\windows\SysWOW64\qq.dll

    Filesize

    22KB

    MD5

    9e33fa28c9f3991dea57e0831366371e

    SHA1

    923732f918748371945abbd1dd3b90fc639c4951

    SHA256

    aa1ed18cf5df1858a8c933b97e4832baa19a239130e101907bedb61879712c42

    SHA512

    61e2413417ab759df739d0de5b4f3192d59a7077e8ef48b9692124cf789219fa12659a5c575c192c606789bdb5ac7102cdb5c48f73525d4e1e40c80a62685f44

  • \Windows\SysWOW64\QQ.dll

    Filesize

    22KB

    MD5

    9e33fa28c9f3991dea57e0831366371e

    SHA1

    923732f918748371945abbd1dd3b90fc639c4951

    SHA256

    aa1ed18cf5df1858a8c933b97e4832baa19a239130e101907bedb61879712c42

    SHA512

    61e2413417ab759df739d0de5b4f3192d59a7077e8ef48b9692124cf789219fa12659a5c575c192c606789bdb5ac7102cdb5c48f73525d4e1e40c80a62685f44

  • memory/892-59-0x0000000000000000-mapping.dmp

  • memory/1524-54-0x0000000000000000-mapping.dmp

  • memory/1524-55-0x0000000076931000-0x0000000076933000-memory.dmp

    Filesize

    8KB