Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2023, 08:38

General

  • Target

    552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll

  • Size

    960KB

  • MD5

    c020f8e756f632c4cd47bc31f100905b

  • SHA1

    a6dddbfd15eda8fd5eda82adf5ffea70ea20d342

  • SHA256

    552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240

  • SHA512

    4c2f074d4da7dc57f36d332b48d256521b2531786409e25f495f6d59ddd1d378d61809189306240d711029b9ae76ff514cd43400e55fce65ff9ae1949532386c

  • SSDEEP

    24576:D+o/IO2KinSjvj/3r+F+BCWYMTnTnSaxioHQp:ao/I9K1bxCPMTnTbP+

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\552c8b4e7e50b09bc45a2dfb8e22ce583cb889631a962c95a86fb7dfb3fb3240.dll,#1
      2⤵
      • Checks BIOS information in registry
      • Enumerates system info in registry
      • Modifies registry class
      PID:2284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 700
        3⤵
        • Program crash
        PID:4044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 692
        3⤵
        • Program crash
        PID:1440
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2284 -ip 2284
    1⤵
      PID:1612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2284 -ip 2284
      1⤵
        PID:4832

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads