Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 07:44

General

  • Target

    4dbf9cb44a88bd1cc97a794384b29e37.dll

  • Size

    331KB

  • MD5

    4dbf9cb44a88bd1cc97a794384b29e37

  • SHA1

    0796ff42e67ea822a614e86801df8a1692f32697

  • SHA256

    2d331e7d819dd74fd9e68cf3eed8d35d276aa5dd5958dcdeb1c823a5db238fa7

  • SHA512

    d04298e06a515339d4a8a5cc972aad03ae93c55440048a500e49eec86e1fd924e325746578cf7a9a4502014c98cdaec27e883da6d2c857c5210a4dec95740559

  • SSDEEP

    6144:WYqIiKtwflY1+HXqnzgE/HqhENXs2dy92NgvpnoJtEh/F:WYlaflYs3aXPy2anwWht

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4dbf9cb44a88bd1cc97a794384b29e37.dll,#1
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 280
      2⤵
      • Program crash
      PID:2912
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4dbf9cb44a88bd1cc97a794384b29e37.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/868-2-0x0000000000740000-0x00000000007C2000-memory.dmp

    Filesize

    520KB

  • memory/868-5-0x0000000000740000-0x00000000007C2000-memory.dmp

    Filesize

    520KB

  • memory/868-8-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB

  • memory/868-7-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/868-6-0x0000000000740000-0x00000000007C2000-memory.dmp

    Filesize

    520KB

  • memory/868-4-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/868-3-0x00000000002D0000-0x000000000030A000-memory.dmp

    Filesize

    232KB

  • memory/868-1-0x0000000000740000-0x00000000007C2000-memory.dmp

    Filesize

    520KB

  • memory/868-0-0x0000000000740000-0x00000000007C2000-memory.dmp

    Filesize

    520KB

  • memory/868-9-0x0000000000740000-0x00000000007C2000-memory.dmp

    Filesize

    520KB

  • memory/868-10-0x00000000002D0000-0x000000000030A000-memory.dmp

    Filesize

    232KB