Analysis

  • max time kernel
    192s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 21:04

General

  • Target

    03fbbba08443d719c48a16380a4c7bca.dll

  • Size

    113KB

  • MD5

    03fbbba08443d719c48a16380a4c7bca

  • SHA1

    2ec24b53585b27f9a778845f4e530e6b0421a575

  • SHA256

    40db3319b8eeec04973e9f67ce1eb5f76160619c9c6a54e3a8208a18be7529d2

  • SHA512

    5e3042db83759db56f1d99cbdf52678f06297f678034a1806122f5012bf5ea38a186944dc1fed4e73ef9922dbe169849d49d70f0ef9fc000088e7592cd76cd86

  • SSDEEP

    3072:sewc6DlnLPTOBZLJW7m3TfY1qCB2Y2FmH2:sewc6DBLbOJW7YfYstY2Fm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\03fbbba08443d719c48a16380a4c7bca.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\03fbbba08443d719c48a16380a4c7bca.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\system32\nulmqp.dll",i
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\nulmqp.dll

    Filesize

    113KB

    MD5

    03fbbba08443d719c48a16380a4c7bca

    SHA1

    2ec24b53585b27f9a778845f4e530e6b0421a575

    SHA256

    40db3319b8eeec04973e9f67ce1eb5f76160619c9c6a54e3a8208a18be7529d2

    SHA512

    5e3042db83759db56f1d99cbdf52678f06297f678034a1806122f5012bf5ea38a186944dc1fed4e73ef9922dbe169849d49d70f0ef9fc000088e7592cd76cd86

  • memory/752-0-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/752-1-0x0000000002DB0000-0x0000000002DB5000-memory.dmp

    Filesize

    20KB

  • memory/752-7-0x0000000002DB0000-0x0000000002DB5000-memory.dmp

    Filesize

    20KB

  • memory/2012-6-0x0000000000790000-0x0000000000795000-memory.dmp

    Filesize

    20KB

  • memory/2012-5-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB