Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 04:32

General

  • Target

    05585c8e35fb205ecd405dcb528ea078.dll

  • Size

    236KB

  • MD5

    05585c8e35fb205ecd405dcb528ea078

  • SHA1

    7aba345c7ac1aae5f9cf8515b211ee2afee0d65b

  • SHA256

    e9fa5d05d94727d7268b53818459d2dea55c5c3510212c741e229d59f1713163

  • SHA512

    ee069f7720d0c7d1150996e088db6473664c30b76a86954642c9354eb34995f082788df1c1ec8cd3080dd7722a475e2a155efe24913e8a7148559f1bd28f5193

  • SSDEEP

    1536:Iguo2K86vta10RJQYPIHL+D5IWhxRh/Ci4ucg3/+k5ltr+DRPG8Gz7wk+cQvMI:Go256vS0RJAL+lHPKi40+66iwkD0z

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\05585c8e35fb205ecd405dcb528ea078.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\05585c8e35fb205ecd405dcb528ea078.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\rpfxt.dll

    Filesize

    129KB

    MD5

    5c51afc1ec40d200ed3c36cf9862f014

    SHA1

    2daf2519ef004f127eaf7728a36a4c4327dcf2f2

    SHA256

    2dc29161ca7b44c9dbbc6836fb49729bbe62bfe3863583798c2a8d8c0df52dff

    SHA512

    55fa92b5fea05ca77cbcf6fb5aea2237bae5f9fc8a9015d7e860747c30fccfac8a770c280ab506460228ad8e6959752a921f450f3f8668b84a1923aa43190be4

  • memory/912-0-0x0000000000180000-0x00000000001C4000-memory.dmp

    Filesize

    272KB

  • memory/912-9-0x0000000077030000-0x00000000770D0000-memory.dmp

    Filesize

    640KB

  • memory/912-6-0x0000000000180000-0x00000000001C4000-memory.dmp

    Filesize

    272KB

  • memory/912-11-0x0000000077030000-0x00000000770D0000-memory.dmp

    Filesize

    640KB

  • memory/912-10-0x0000000000180000-0x00000000001C4000-memory.dmp

    Filesize

    272KB