Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:59

General

  • Target

    123922a75b3c652a02842ffcb351375e.dll

  • Size

    74KB

  • MD5

    123922a75b3c652a02842ffcb351375e

  • SHA1

    bfbfe053c143e9100925e903b94be61fe67120ee

  • SHA256

    d004703d8123c73a5f159d43c5052ae58c9cf67428bb0dded6f7bf4cd819ac35

  • SHA512

    68bc75688a823a25037608ab9b31944443e16f69166103465e56d676a370adc9a71d7486cf673b9b7b297dd79b1c45c18acd7a791c40b809d26c70ca91a7b3b3

  • SSDEEP

    1536:mDNWJE2vWZM+853elCFEFl0dl07tWogxohhXqSOBQ/:ms22gY53elCqk/07tWZxq9F/

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\123922a75b3c652a02842ffcb351375e.dll,#1
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5804
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\123922a75b3c652a02842ffcb351375e.dll",iep
      2⤵
        PID:2312
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\123922a75b3c652a02842ffcb351375e.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4076

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2312-18-0x0000000002A10000-0x0000000002A20000-memory.dmp

            Filesize

            64KB

          • memory/2312-17-0x0000000002A10000-0x0000000002A20000-memory.dmp

            Filesize

            64KB

          • memory/2312-11-0x0000000002A10000-0x0000000002A20000-memory.dmp

            Filesize

            64KB

          • memory/2312-14-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/2312-12-0x0000000002A10000-0x0000000002A20000-memory.dmp

            Filesize

            64KB

          • memory/5804-31-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-6-0x0000000001560000-0x0000000001570000-memory.dmp

            Filesize

            64KB

          • memory/5804-4-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-2-0x0000000001560000-0x0000000001570000-memory.dmp

            Filesize

            64KB

          • memory/5804-0-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-3-0x0000000001560000-0x0000000001570000-memory.dmp

            Filesize

            64KB

          • memory/5804-10-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-7-0x0000000001560000-0x0000000001570000-memory.dmp

            Filesize

            64KB

          • memory/5804-1-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-25-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-27-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-13-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/5804-33-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB