Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2024 23:34

General

  • Target

    3f50374c644033d987169a5affb3378c.dll

  • Size

    269KB

  • MD5

    3f50374c644033d987169a5affb3378c

  • SHA1

    7145bad50bd086a4f0ccfcbcbe503f8edea72cdf

  • SHA256

    cdbf4b2d6bd3f727104f915b56cc4aac228e4b51dd91ae3fd14351000afb6416

  • SHA512

    a5a3033325d81d218e3289ac9b6d6df403041a0b08ebf88ebc8a13fdc97906d1a8ce8179a86f74cfa042dc6d3c91b9ac0eddcba2957ad932088d6ab4066ad5d3

  • SSDEEP

    6144:FTdochbDK1aPnNaotanzwDH/yvjEp5ERAPzBn5aNyP7VL:MxVoIzwijEkGhMeVL

Score
7/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3f50374c644033d987169a5affb3378c.dll,#1
    1⤵
    • Registers COM server for autorun
    • Modifies registry class
    PID:2372

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Replay Monitor

Loading Replay Monitor...

Downloads