Malware Analysis Report

2024-11-30 22:38

Sample ID 230527-g4ycjabc5y
Target main.dll
SHA256 6c0d3531c95bf245d6413dc7f3bf5739fc41f6064bf6d8fc66443f8e46d9ffd2
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

6c0d3531c95bf245d6413dc7f3bf5739fc41f6064bf6d8fc66443f8e46d9ffd2

Threat Level: Likely benign

The file main.dll was found to be: Likely benign.

Malicious Activity Summary


Unsigned PE

Program crash

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-05-27 06:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-05-27 06:22

Reported

2023-05-27 06:24

Platform

win7-20230220-en

Max time kernel

27s

Max time network

29s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\main.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\main.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\main.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 224

Network

N/A

Files

memory/936-54-0x0000000010000000-0x00000000100BD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-05-27 06:22

Reported

2023-05-27 06:24

Platform

win10v2004-20230220-en

Max time kernel

55s

Max time network

128s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\main.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3004 wrote to memory of 3212 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3004 wrote to memory of 3212 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3004 wrote to memory of 3212 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1108 wrote to memory of 2592 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\rundll32.exe
PID 1108 wrote to memory of 2592 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\main.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\main.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3212 -ip 3212

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 600

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\system32\rundll32.exe

rundll32 main.dll,next

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 52.152.108.96:443 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 20.42.65.90:443 tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 62.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 2.36.159.162.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 209.197.3.8:80 tcp

Files

memory/3212-133-0x0000000010000000-0x00000000100BD000-memory.dmp