Analysis
-
max time kernel
9s -
max time network
13s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18-07-2023 21:00
Behavioral task
behavioral1
Sample
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
Resource
win10-20230703-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll
-
Size
335KB
-
MD5
a637c909097b250da561b12ae33e7486
-
SHA1
f71cc41357814b5c3b132aaaedd6a24ebbd0c102
-
SHA256
b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3
-
SHA512
a02a4244947a3ca24d65a356b8ae405b4620884d033d29570a411c539f6e55eca0c579ab3b61de9a14e4eaec66417e57974ee7b28bb03e2728c359cef3168ce3
-
SSDEEP
6144:R1VH+po6EJ5IYW6eBveHVK8PNEt1ZJr0HkT7Npvm7sbnTH7Mx:3d4oR+YImEx/gkThp0wnTHYx
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 928 rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\Tasks\NvTmRep_CrashReport4_{ B2FE1952 - 0186 - 46H3 - BAHC - A80AA35AH5B8 }.job rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
rundll32.exepid process 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2128 wrote to memory of 928 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 928 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 928 2128 rundll32.exe rundll32.exe PID 928 wrote to memory of 2464 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2464 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2464 928 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3d7005a06021286c84ed7f8293cba966e0137df769e80579df7f3c6a2d3c1f3.dll,#12⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C nltest /domain_trusts > C:\ProgramData\TMPUSER.DAT3⤵PID:2464
-
-