Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2023 01:24

General

  • Target

    341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f.dll

  • Size

    15.9MB

  • MD5

    bad6632711595461b44bce2e04fbd683

  • SHA1

    a550fe08a53ada4c3953f2628fb1c8c8a7f112a7

  • SHA256

    341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f

  • SHA512

    119a7aecdca0337f52690f5c4b9271856ee70e506ba63ab98f7d3aede77ff6501af5bfb3e94303007d1fe19edef870c7f0b76b83b8c544df9b168d80d354a338

  • SSDEEP

    393216:f0o5YEDBREkN7/YMtK1F5Jexa5iH1JmtyGkq/57HlS:RBksKzexa5iUwq/5g

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f.dll,#1
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads