Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 10:34

General

  • Target

    290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll

  • Size

    4.8MB

  • MD5

    2a0930f462f3a2e5b74b1db1b128b550

  • SHA1

    d1d1f8a9a65fb38cc1fc2337a696f88d63ad39d1

  • SHA256

    290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08

  • SHA512

    7fa623c94ee2d62f427a9ea736a60fda4168d8ac137385a0bbbba16836b04c9991b6dfbcc9e1093291451489259424c24165819dd6d44826debaf8396e1d2250

  • SSDEEP

    98304:u3VOzR5v8Qm/jEXUx4w6kLLF/9aNtFuSbfr0hz7m:kbsgKttzI

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\290cdbf4f133d4725e3b71947de7257e1b76ac0f9efdf0d5b766cbdf7f68fb08.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      PID:4496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 1648
        3⤵
        • Program crash
        PID:4752
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4496 -ip 4496
    1⤵
      PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\netul.dll

      Filesize

      384KB

      MD5

      9c7b76d69c67618fda3b54a380378963

      SHA1

      3e0238d54e652746e9b331e9c341026ff26390cd

      SHA256

      121f365a0c7d0c7e1983d23ea6c4b73f2b0fb1430c3e61f936e8e0d512e5bdf7

      SHA512

      10aa256b8faad0777903da89aff85a6d0131d5f4db1cea05b42ca69e18d01e610ee1bfecd1c8494f2b8fcebe83fd7dd4c9eeb6bf8c894f7bbd07afde667f1d94

    • C:\Users\Admin\AppData\Local\Temp\netul.dll

      Filesize

      1.1MB

      MD5

      26173e9c3998876d8d21d5063e02d3dd

      SHA1

      45eef50d6f845622a3384e34529abd9df43720c9

      SHA256

      b1cc9445fd331df90f3dcd5eacbeff62ac9189aa867def1970bf1d755ef43b31

      SHA512

      4f28a32b9e538e10de1533d8168a0b2e81793e73310d224bde4648b17f8bb9d1d24d0b40cc6f9b819489a0c7de1804d381d936069a093543b8aa0d3c62a50f12