Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 11:55

General

  • Target

    995c8b9cdaf3e54ea41f4fd97c6f989b.dll

  • Size

    110KB

  • MD5

    995c8b9cdaf3e54ea41f4fd97c6f989b

  • SHA1

    2ffe970eb0cb6ee420f2f61461de0a30fd3251ed

  • SHA256

    419c74a3083695dabe2c59f2d4d2e49b53996ee6352f037abc672becb93df7a0

  • SHA512

    26a2d2e200cb4b0bfc18be9e235ade017d499e914e9cb58a8e63433de334c0dd7a5b7ff850451e075d20fb4235c5e8471e7ba406538bd44c254eb1db19505031

  • SSDEEP

    1536:fy8Q6o9/onIze7zVRaDk20Lmw+RsIL1zfoASgVMo1Cc+zxr2VLBHT:fyr9fz8T6E+RZLpThMo1CBzxrC1H

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\995c8b9cdaf3e54ea41f4fd97c6f989b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\995c8b9cdaf3e54ea41f4fd97c6f989b.dll,#1
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DelEx.bat" "
        3⤵
          PID:4748

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\DelEx.bat

            Filesize

            152B

            MD5

            5390347822bd255bcb75299cfef33c78

            SHA1

            1ca8c7165dbe2c25ccba5810643e5f6ea47a27fc

            SHA256

            740c230b59e7cec944d0247d25043068a2398d17730e9b950d6267685f3bf43f

            SHA512

            8f2476b7fa1042c6100e57b7cae97e296ec7de71950826593714bb54126c215c19e0fad0f653c2f6848c1332cb115a37403d241e6ae0740c269a53fa451f780c

          • memory/4528-0-0x0000000002190000-0x00000000021B3000-memory.dmp

            Filesize

            140KB