Resubmissions

21/08/2023, 12:33

230821-prkjxacg64 10

21/08/2023, 12:28

230821-pnqazsee4z 6

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 12:28

General

  • Target

    4545.dll

  • Size

    627KB

  • MD5

    86efe486dedbca08d9ce8a0b4156b75b

  • SHA1

    4f977cef5183e3d325cd8f9bb245b7de0f288256

  • SHA256

    9b85fbfa3892a7a6deffba5d5bc5dd9c35ac6cb97a631752142faa0839423186

  • SHA512

    56ba499f7e9dddccb029337048713171bc47f9055de68bb4a734a617fc12bf1870326ab97c3838e6c16e809d1c38326a57585469f40843e6ed54d92b5f1cca76

  • SSDEEP

    12288:2TrZPDCk8aIcpSUM8IbLnFEeVJGAuG/g1ms5ULR:Ekk8av9IXFZoA9ghG

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4545.dll
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\system32\notepad.exe
      notepad.exe
      2⤵
        PID:1644

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/996-133-0x00007FF819190000-0x00007FF819385000-memory.dmp

            Filesize

            2.0MB

          • memory/996-135-0x0000000002B10000-0x0000000002B62000-memory.dmp

            Filesize

            328KB

          • memory/996-136-0x00007FFFFAD90000-0x00007FFFFB851000-memory.dmp

            Filesize

            10.8MB

          • memory/996-137-0x0000000002F90000-0x0000000002FA0000-memory.dmp

            Filesize

            64KB

          • memory/996-138-0x0000000002F90000-0x0000000002FA0000-memory.dmp

            Filesize

            64KB

          • memory/996-139-0x0000000002F90000-0x0000000002FA0000-memory.dmp

            Filesize

            64KB

          • memory/996-140-0x000000001BF70000-0x000000001BF82000-memory.dmp

            Filesize

            72KB

          • memory/996-141-0x000000001C210000-0x000000001C24C000-memory.dmp

            Filesize

            240KB

          • memory/996-142-0x00007FFFFAD90000-0x00007FFFFB851000-memory.dmp

            Filesize

            10.8MB

          • memory/996-144-0x0000000002F90000-0x0000000002FA0000-memory.dmp

            Filesize

            64KB

          • memory/996-145-0x0000000002F90000-0x0000000002FA0000-memory.dmp

            Filesize

            64KB

          • memory/996-146-0x0000000002F90000-0x0000000002FA0000-memory.dmp

            Filesize

            64KB