Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 21:21

General

  • Target

    04538fda51509985af0682a14a2f3d0a.dll

  • Size

    236KB

  • MD5

    04538fda51509985af0682a14a2f3d0a

  • SHA1

    8fa9a42fdc310570f296e3b5773a36057b276bfa

  • SHA256

    e19a87d55e0edfcda9438310e10a004fcbb8e9946d3ca722ea21ab33aa24dbd9

  • SHA512

    e14d3b5839539c194653cf619d101721f43024141960e52877b048d1fa7a2e7cd8066d394100e9acd975b465447a3ab791e4039d5376a3b1b1f50bb467a8fa8f

  • SSDEEP

    1536:1dKaTHN2ymZ0ofa5uQm4V7HG8ldINh+RhFtFftCgpcGO5lPf/XG8GmGwktb4:1Y4tIQG8XAmbFfaGc1fawk14

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\04538fda51509985af0682a14a2f3d0a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\04538fda51509985af0682a14a2f3d0a.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\topsp.dll

    Filesize

    423KB

    MD5

    2499bcc183dbdaa424a6a5ad2bdaa988

    SHA1

    634cf679899cb63549f34a9269f79ef14701638d

    SHA256

    930adcaa3234118c53fcf8aad71202279f14b919b0c8ca864853d6a15ae0e5e9

    SHA512

    11227719e8b9ff563e6353c62b696705db6cec76428fc4d8015d136b379320743fe5733e64bf0f1e501d0d22b6d797fe39dc8d1da09905aab8f45722b0a80d74

  • C:\Windows\SysWOW64\topsp.dll

    Filesize

    235KB

    MD5

    ef3e1c13e35a82a431a6bd8853fd96fa

    SHA1

    6c43b3cc8b355c8457d93792f6225aff4d289f7c

    SHA256

    f902b33f20a0de0ee0e1671715c59c89ffc86fa12d3a8bcd0268d1ee6a8eeb6c

    SHA512

    f5bb9295fed52d03fb16ad8d11c72634ed991fc27b6c6847a7f48a8b6beebfce890801b83293190b5b4bc4490c6a175902e3f11a3d34f5fa8b93a12a2429e9fb

  • memory/456-0-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/456-7-0x0000000076980000-0x00000000769FA000-memory.dmp

    Filesize

    488KB

  • memory/456-10-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/456-11-0x0000000076980000-0x00000000769FA000-memory.dmp

    Filesize

    488KB