Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 14:45

General

  • Target

    56bf51ba72b6aa8cf3876d17869be47a.dll

  • Size

    60KB

  • MD5

    56bf51ba72b6aa8cf3876d17869be47a

  • SHA1

    1edd5c50a648f5e42dd3e3912810c2abe6b6b8ca

  • SHA256

    e56d21401db107c5e6c7b7e71a8236bf506cb352ff14b38495a7944e5f8a1397

  • SHA512

    edc6302b57786253fc88e22d7223e5ec1907944b63628849c720994b337c540c661e8e7315639e054c2b1d9d31c1eea48902f0137bdae4814b4eb3d16bdc8eac

  • SSDEEP

    1536:H4Mev4M8IeRw/gbx1WOXlh9lYTOn8ZAWm26rPrjdeh7:H4Mgue/gbxUS4xZnm2OT5A7

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1360
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\56bf51ba72b6aa8cf3876d17869be47a.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\56bf51ba72b6aa8cf3876d17869be47a.dll,#1
          3⤵
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Windows\SysWOW64\RunDll32.exe
            RunDll32 "C:\Users\Admin\AppData\Local\Temp\56bf51ba72b6aa8cf3876d17869be47a.dll",Init
            4⤵
              PID:1952
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1320
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1216

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Common Files\lsalogms.dll

            Filesize

            60KB

            MD5

            56bf51ba72b6aa8cf3876d17869be47a

            SHA1

            1edd5c50a648f5e42dd3e3912810c2abe6b6b8ca

            SHA256

            e56d21401db107c5e6c7b7e71a8236bf506cb352ff14b38495a7944e5f8a1397

            SHA512

            edc6302b57786253fc88e22d7223e5ec1907944b63628849c720994b337c540c661e8e7315639e054c2b1d9d31c1eea48902f0137bdae4814b4eb3d16bdc8eac

          • memory/1216-10-0x0000000001D20000-0x0000000001D21000-memory.dmp

            Filesize

            4KB

          • memory/1216-9-0x0000000001D20000-0x0000000001D21000-memory.dmp

            Filesize

            4KB

          • memory/1744-0-0x0000000075530000-0x0000000075553000-memory.dmp

            Filesize

            140KB

          • memory/1744-1-0x0000000075530000-0x0000000075553000-memory.dmp

            Filesize

            140KB

          • memory/1744-25-0x0000000075530000-0x0000000075553000-memory.dmp

            Filesize

            140KB

          • memory/1952-23-0x0000000000120000-0x0000000000121000-memory.dmp

            Filesize

            4KB

          • memory/1952-24-0x0000000000120000-0x0000000000121000-memory.dmp

            Filesize

            4KB

          • memory/1952-26-0x0000000075530000-0x0000000075553000-memory.dmp

            Filesize

            140KB