Analysis

  • max time kernel
    9s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2023 22:08

General

  • Target

    System/RGSS301.dll

  • Size

    1.0MB

  • MD5

    dd25855ac39d32da033902fc58fa210b

  • SHA1

    0ffa23a4d0b81438a329258f5c8d3b3403f4aa94

  • SHA256

    27647690ed16218cd988dd71069fdca67207515b2a2df775be361f0198ab6876

  • SHA512

    07f7f7cb4eda2165b4b28456fb01d4edea6e3d5f305dde19256865777905a0d0bb1d13ce1194a8639d740f633ccf1507a1b87530644d5e2d512a86829195ae60

  • SSDEEP

    24576:+pc8WbPqpzFwdPhet279ae3P7zqP2JzCNkX67Flr1nH0F3ia:+pc8W7qEdPhet2hae3HfJR2Uf

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\System\RGSS301.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\System\RGSS301.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Modifies registry class
      PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1784-54-0x0000000000000000-mapping.dmp

  • memory/1784-55-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB