Analysis
-
max time kernel
128s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08-08-2023 20:07
General
-
Target
b17f6d86a9b9d63e841046b6b999e1197e81b2cf5cc6bcf376be9698e5d0f84b.dll
-
Size
6.1MB
-
MD5
23540c83cc4620f33d45dea691c6888b
-
SHA1
bbdb961ad6fd8ad40cc3b8174242ca64f9a446a8
-
SHA256
b17f6d86a9b9d63e841046b6b999e1197e81b2cf5cc6bcf376be9698e5d0f84b
-
SHA512
e1a0bdded23488865ed658e53126c00856755a0d80d859ff021cd28eedb0e9ec7678812e61cb08434fcdefd5337f166383abee90d4f9057100ebb0d05cf8a9f5
-
SSDEEP
98304:Oz3igQYVx9ZE5nYiF/VoazNgNEGlqlls7aJAUMLy6ynCU/W4+EBEA4oPNp:EygQWbe/VooNy10s2ZMLylTtrB
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 4796 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/4796-118-0x00007FFF8FC50000-0x00007FFF90723000-memory.dmp vmprotect behavioral1/memory/4796-125-0x00007FFF8FC50000-0x00007FFF90723000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 4796 rundll32.exe 4796 rundll32.exe 4796 rundll32.exe 4796 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4796-117-0x00007FFF9C5D0000-0x00007FFF9C5D2000-memory.dmpFilesize
8KB
-
memory/4796-119-0x00007FFF9C5E0000-0x00007FFF9C5E2000-memory.dmpFilesize
8KB
-
memory/4796-120-0x00007FFF9A8D0000-0x00007FFF9A8D2000-memory.dmpFilesize
8KB
-
memory/4796-118-0x00007FFF8FC50000-0x00007FFF90723000-memory.dmpFilesize
10.8MB
-
memory/4796-122-0x00007FFF98C90000-0x00007FFF98C92000-memory.dmpFilesize
8KB
-
memory/4796-121-0x00007FFF9A8E0000-0x00007FFF9A8E2000-memory.dmpFilesize
8KB
-
memory/4796-123-0x00007FFF98CA0000-0x00007FFF98CA2000-memory.dmpFilesize
8KB
-
memory/4796-124-0x00007FFF9C5F0000-0x00007FFF9C5F2000-memory.dmpFilesize
8KB
-
memory/4796-125-0x00007FFF8FC50000-0x00007FFF90723000-memory.dmpFilesize
10.8MB