Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2023, 01:24

General

  • Target

    341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f.dll

  • Size

    15.9MB

  • MD5

    bad6632711595461b44bce2e04fbd683

  • SHA1

    a550fe08a53ada4c3953f2628fb1c8c8a7f112a7

  • SHA256

    341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f

  • SHA512

    119a7aecdca0337f52690f5c4b9271856ee70e506ba63ab98f7d3aede77ff6501af5bfb3e94303007d1fe19edef870c7f0b76b83b8c544df9b168d80d354a338

  • SSDEEP

    393216:f0o5YEDBREkN7/YMtK1F5Jexa5iH1JmtyGkq/57HlS:RBksKzexa5iUwq/5g

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\341a0e33c9d2dc92bd52463041b438bdc4fcb654d1a5482e6cf1557c3e674e7f.dll,#1
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4888

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads