Analysis

  • max time kernel
    152s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 00:13

General

  • Target

    a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll

  • Size

    101KB

  • MD5

    cd7025a2c42410cdd034eca2e5b191e0

  • SHA1

    13ce5d3daab90708983eb66bc0ece5fcc3e4eeba

  • SHA256

    a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14

  • SHA512

    3192519e964220c0413d596e074da3abaaeae5d9495b7623410410046637318a2f49525a75f16fcfec29a4359329d212a4cbe1fa4f1fc645adadddb0c79476e5

  • SSDEEP

    3072:bGi1nGeyrKDXz3XAawc6HaWYK3f/NAo4:CiqKTw190KvVAo

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a0ab86e9efe2856e3f117c10199eec4bbe0ab86dcad8c5cbb0f4d5164d0b9a14.dll,#1
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      PID:396

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/396-136-0x00000000022C0000-0x0000000002332000-memory.dmp

          Filesize

          456KB

        • memory/396-138-0x00000000022C0000-0x0000000002332000-memory.dmp

          Filesize

          456KB