Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 16:32

General

  • Target

    05e35d35c8c24247e0c098fab4626222.dll

  • Size

    236KB

  • MD5

    05e35d35c8c24247e0c098fab4626222

  • SHA1

    f2b4210e435df8f338c6b4f7c586e26c5b50a1fe

  • SHA256

    e46ad3f0f004b17192351015302239693bf290a311a32fbbbec25dfcb97cd967

  • SHA512

    53667185b940afc90497f0bb3ec4fb5ef591dcdc56443856df12afca867bdd697f0ee930622dbc0518d76750ae107ab323b5b47b58996f98da99400599597e2a

  • SSDEEP

    1536:1dKaTHN2ymZ0ofa5uQm4V7HG8ldINh+RhFtFftCgpcGO5lPf/XG8GmGwktbs:1Y4tIQG8XAmbFfaGc1fawk1s

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\05e35d35c8c24247e0c098fab4626222.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3376
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\05e35d35c8c24247e0c098fab4626222.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\vhp.dll

    Filesize

    90KB

    MD5

    c1577305dc2649d36aa4fc88113b28a2

    SHA1

    8f3099e8cf1aaa3d9cc2b53f61ea08c949eac23c

    SHA256

    f9aea565afc8bdcd5d824b6c10136c7a5de8e35bee51e5ac3b764e783f39755e

    SHA512

    e659b9dba41ab8e841b3bf655a931906a064f699916027991193946b73c9723e315021b1b33a634b7b64ca469e0ad721bee314e8f0451c1d0c8583d4743d0197

  • C:\Windows\SysWOW64\vhp.dll

    Filesize

    44KB

    MD5

    0cfdbe1c0b0fc3c2529ea8cce52ee1c6

    SHA1

    ded9884ba3d64a95f023cf2608c334bb0af8b7a3

    SHA256

    4332f3a7bf0ade8c8eb1248c77c0220349a1a4b0e9aa726a9473882c41be6c08

    SHA512

    2cae8e609499778b9b9147e5be69a746b50f632d0fe31c275f0101d14d716f30e25291ba328352b8be4607667fbc78a9ae62fbe5cbc2ea7c88373af3325e1366

  • memory/4620-1-0x0000000002100000-0x0000000002144000-memory.dmp

    Filesize

    272KB

  • memory/4620-0-0x0000000002100000-0x0000000002144000-memory.dmp

    Filesize

    272KB

  • memory/4620-8-0x00000000754A0000-0x000000007551A000-memory.dmp

    Filesize

    488KB

  • memory/4620-9-0x0000000002100000-0x0000000002144000-memory.dmp

    Filesize

    272KB

  • memory/4620-10-0x00000000754A0000-0x000000007551A000-memory.dmp

    Filesize

    488KB