Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2023 15:39

General

  • Target

    awdawcawdawdaw.dll

  • Size

    364KB

  • MD5

    7205f7a87ae43f2a44e957da375ec737

  • SHA1

    c0f05bf3fac27fa03fdc19fae2d4bbd1e9c44132

  • SHA256

    318440d1fdbe2178d0c00f259b27430b1d6951de2b436157d8ad2139a30f62b4

  • SHA512

    be0c6174a8fff24043e7c4c19c37cf71cb751d33476d15e1cf29fa7ce1f6e993f0cae8c5ec02a96f1e75b1f909f9e94a6c4d6267bdb7dec88cadb9bf3ecdc4e2

  • SSDEEP

    6144:xKwmzKKeCO9UAhB++UcyBhc9SsSSWNPXfer7EGjvlBRuncqXxCtHx:xKVwBewwcy7sIXfeEGj0zs

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\awdawcawdawdaw.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\awdawcawdawdaw.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Windows\SysWOW64\SearchProtocolHost.exe
        "C:\Windows\System32\SearchProtocolHost.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3840
        • C:\Windows\SysWOW64\whoami.exe
          whoami.exe /all
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4624
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig.exe /all
          4⤵
          • Gathers network information
          PID:1592
        • C:\Windows\SysWOW64\netstat.exe
          netstat.exe -aon
          4⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:2076
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3412
    • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
      "PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp'
      1⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3368
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" .\awdawcawdawdaw.dll,watchdog
        2⤵
          PID:1712
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" .\awdawcawdawdaw.dll,watchdog
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            PID:464
            • C:\Windows\SysWOW64\SearchProtocolHost.exe
              "C:\Windows\System32\SearchProtocolHost.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3636

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5tgjegmn.lbi.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/3368-163-0x000002A2708B0000-0x000002A2708C0000-memory.dmp

        Filesize

        64KB

      • memory/3368-164-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-174-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-172-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-162-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-159-0x000002A271900000-0x000002A271976000-memory.dmp

        Filesize

        472KB

      • memory/3368-176-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-160-0x000002A271880000-0x000002A27189E000-memory.dmp

        Filesize

        120KB

      • memory/3368-158-0x000002A270850000-0x000002A270894000-memory.dmp

        Filesize

        272KB

      • memory/3368-150-0x000002A270590000-0x000002A2705B2000-memory.dmp

        Filesize

        136KB

      • memory/3368-181-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-155-0x000002A26F940000-0x000002A270401000-memory.dmp

        Filesize

        10.8MB

      • memory/3368-156-0x000002A2708B0000-0x000002A2708C0000-memory.dmp

        Filesize

        64KB

      • memory/3368-157-0x000002A2708B0000-0x000002A2708C0000-memory.dmp

        Filesize

        64KB

      • memory/3636-168-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3636-167-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-141-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-161-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-142-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-133-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-140-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-139-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-138-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-171-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-137-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-173-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-136-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-175-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-135-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-177-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-179-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-134-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB

      • memory/3840-182-0x0000000000E00000-0x0000000000E31000-memory.dmp

        Filesize

        196KB