Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 06:31

General

  • Target

    458741d581bc5b7f1b4d1299c6b5389f.dll

  • Size

    116KB

  • MD5

    458741d581bc5b7f1b4d1299c6b5389f

  • SHA1

    4f9271e26a6b7de5058f995fe6ea61a408594805

  • SHA256

    cc03848a4549861a4c40e4cca8856ef8fe8525987a5c100f7e4668bda984809d

  • SHA512

    99b31fee192af294fd472c50fca8f6edc9886f70226bd2a6ba9f04853cfc8697ef9d8182dcf81a71137d0b2536a60f4a5e38fd476fc9408a4bdd755de9a9506b

  • SSDEEP

    3072:e49bhTizc8ocLJ55VzdRl4o/zFGdewQ90qU1Ddqb/RH:e49bF25bzBz/EdeSjDu5

Score
6/10

Malware Config

Signatures

  • Modifies WinLogon 2 TTPs 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\458741d581bc5b7f1b4d1299c6b5389f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\458741d581bc5b7f1b4d1299c6b5389f.dll,#1
      2⤵
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads