Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 01:43

General

  • Target

    4a2e54d3df655e0facc47b714bca66d5.dll

  • Size

    62KB

  • MD5

    4a2e54d3df655e0facc47b714bca66d5

  • SHA1

    a5f3842e889d140c0f88713803502db48d00c6e1

  • SHA256

    50d3f3e40c6e0ec3f2f3431888c8c83b851fdda5ee2cc0e45f32d8f3494c5112

  • SHA512

    ecd515c5dacfbdfb3ed2f24a9169ec86cd683b60ab05b200555b007ea090e84c2521014124007eea66b95a6fbc6150ea4f74909ac862f343c7bca03adf2ad895

  • SSDEEP

    1536:mbLphu3oYbGoRh7dV9fjTL4ohoOj/0YXfiWIj:Ipmogn9ffcoho6/XXfP

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a2e54d3df655e0facc47b714bca66d5.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a2e54d3df655e0facc47b714bca66d5.dll,#1
      2⤵
      • Sets service image path in registry
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:1888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1888-2-0x00000000001F0000-0x0000000000270000-memory.dmp

    Filesize

    512KB

  • memory/1888-4-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB