Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 22:24

General

  • Target

    158b5c92c38d7933d5264b5fd2d2a83d.exe

  • Size

    78KB

  • MD5

    158b5c92c38d7933d5264b5fd2d2a83d

  • SHA1

    4dcb5944ff4d8d3be822c98a77f92e043941e43d

  • SHA256

    d3ae8cef984fa2b8dad2b566da020b7aaf2751255bb6b0833a2b99e7d9f538c2

  • SHA512

    f9bff7fc967b718022a85b531f9c49334a8adcb6b7adda301ec83942de626e769f2ab93a7bacff75cd30df9d7e174d5129d3b9e69bf2fbbf719aa51558eb26b9

  • SSDEEP

    1536:kLHk5SjT1qrBTTHA8mEYyEo6g2/TbULkYi45x+1IVXusi1s:oHYS+BvHANEpEo6g0/8kYB5xC+uh1

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158b5c92c38d7933d5264b5fd2d2a83d.exe
    "C:\Users\Admin\AppData\Local\Temp\158b5c92c38d7933d5264b5fd2d2a83d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\monDIN.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\monDIN.dll",iep
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:5056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\monDIN.dll

    Filesize

    78KB

    MD5

    00f07e2f521267cac01e7b2533da1fc5

    SHA1

    7936389a5e2c9a630cdd51e0beb5da585c40d850

    SHA256

    fb795eaf8126a7485e95554f19226a84899faa1a9a2d8d2576deb36205aff92d

    SHA512

    4648240e3671b670c645e36d57c769e2ad513247413991f4044b1aae3df39da2b3eb111508b8e4759df3bdfc5888fdecd95623434124f63b7e698bac4ba5fd56

  • memory/4184-13-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4184-18-0x0000000002A90000-0x0000000002AA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-28-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4184-24-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4184-8-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4184-9-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4184-10-0x0000000002A90000-0x0000000002AA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-11-0x0000000002A90000-0x0000000002AA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-19-0x0000000002A90000-0x0000000002AA0000-memory.dmp

    Filesize

    64KB

  • memory/4408-17-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4408-2-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4408-16-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4408-0-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4408-12-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4408-1-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4408-3-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/5056-25-0x00000000022F0000-0x0000000002300000-memory.dmp

    Filesize

    64KB

  • memory/5056-26-0x00000000022F0000-0x0000000002300000-memory.dmp

    Filesize

    64KB

  • memory/5056-29-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/5056-31-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/5056-32-0x00000000022F0000-0x0000000002300000-memory.dmp

    Filesize

    64KB

  • memory/5056-33-0x00000000022F0000-0x0000000002300000-memory.dmp

    Filesize

    64KB