Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 05:27

General

  • Target

    1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll

  • Size

    984KB

  • MD5

    8edc68861e99ad2cc519ad54fb1b3ed4

  • SHA1

    c1c02f6041eaeb58cdfcf29da9fb204622dd274c

  • SHA256

    1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39

  • SHA512

    270e31f654750ab3890c5ea19d31872d80df5704279b26ac5056689e70ba82036a89066634931fd7123c051b3be0a7785d50985b7a2a2b8095644628c3438c67

  • SSDEEP

    24576:u8WXo3FXErUxj5r0cG4U1hH1fhKspa2M9b4VBq4vxlDx0llv9kYPWxZPTCpA99qb:ue5xj5r0h4U1hHRhKspWSq

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1787ff6d04d463e1595b4195eee87fb56240f0cde8c10196cd253def6898dc39.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\CMD.exe
        CMD /C SC STOP
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3132
        • C:\Windows\SysWOW64\sc.exe
          SC STOP
          4⤵
          • Launches sc.exe
          PID:696
      • C:\Windows\SysWOW64\CMD.exe
        CMD /C SC DELETE
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Windows\SysWOW64\sc.exe
          SC DELETE
          4⤵
          • Launches sc.exe
          PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2868-0-0x0000000010000000-0x000000001011C000-memory.dmp

    Filesize

    1.1MB

  • memory/2868-4-0x0000000010000000-0x000000001011C000-memory.dmp

    Filesize

    1.1MB

  • memory/2868-7-0x0000000010000000-0x000000001011C000-memory.dmp

    Filesize

    1.1MB