Resubmissions

14/02/2024, 10:18

240214-mcaeaafg4y 7

14/02/2024, 10:16

240214-masg3sgg75 7

Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 10:18

General

  • Target

    $PLUGINSDIR/CLR.dll

  • Size

    93KB

  • MD5

    732691c7a1ef4e7decb9d8c52010a709

  • SHA1

    ecbf0bbcb051433d570e212e73a883f8e5f19996

  • SHA256

    5f3573a00f3333d7587044f59b72511263103525d2cdfe79475c6726735d0812

  • SHA512

    fcbde499f9592ae25b757e805892f43ffe50c475bc54ea3e992bc2db647e42d661c3dad2c4056da89fe4a62365f5b57df24d1083382ebdbd146bfb83d48d167a

  • SSDEEP

    1536:XJgC8K1IbncO54uknhaaA7qbFG8iY2h+7OiYtlmctUudvmpfD65OgOj:XJf8K1ITc3A7qbFG8iY2h+7OiYtlmctu

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\CLR.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\CLR.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1004
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4580-0-0x00000000013C0000-0x00000000013D0000-memory.dmp

          Filesize

          64KB

        • memory/4580-1-0x0000000074FB0000-0x0000000075561000-memory.dmp

          Filesize

          5.7MB

        • memory/4580-2-0x0000000074FB0000-0x0000000075561000-memory.dmp

          Filesize

          5.7MB

        • memory/4580-3-0x00000000013C0000-0x00000000013D0000-memory.dmp

          Filesize

          64KB

        • memory/4580-4-0x00000000013C0000-0x00000000013D0000-memory.dmp

          Filesize

          64KB

        • memory/4580-11-0x0000000074FB0000-0x0000000075561000-memory.dmp

          Filesize

          5.7MB