Analysis

  • max time kernel
    195s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 20:53

General

  • Target

    4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll

  • Size

    2.8MB

  • MD5

    9f6e0d492f7445840ad2d7052cfa177f

  • SHA1

    2bc776e2c636e317db3ed701187ee7863fb41543

  • SHA256

    4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c

  • SHA512

    051c4069026b79c1a30f2a3eb77a498f6907053754aa0a887fa29670321d70e9f108957cf7e94dad25bf941562f20678875a2d07b469b0ffc69e3eb5687a6577

  • SSDEEP

    49152:nak0aV1RZLnSnZ6R2S3IJ5RLqe94arMhjcU+uwaHz+hxJ+0pcMZ/3Vz:a381RZLngS3IJ5RLu0MhKhx80pRP

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a3d3363e5d265a5d1d1a5e0943ae88214bd3806ab4f94be7ebfe9ba9bef9b0c.dll,#1
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/996-0-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB

        • memory/996-1-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB

        • memory/996-2-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB

        • memory/996-3-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB

        • memory/996-4-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB

        • memory/996-6-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB

        • memory/996-7-0x0000000010000000-0x0000000010421000-memory.dmp

          Filesize

          4.1MB