Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 05:19

General

  • Target

    ba9d2da65c3fb6005f82002196e75cfd.dll

  • Size

    29KB

  • MD5

    ba9d2da65c3fb6005f82002196e75cfd

  • SHA1

    d75a9b8100c99f5b09f4262b1f1e38c598bbf7e1

  • SHA256

    6690a24c6bcfea493a72257514fd1ec76c8cdd61c7b84f7180ff051d2677c7eb

  • SHA512

    d1da5409da379597b62b93bb965effe9b823bf3d9cf6107145eba0d7034610429a0f673b07083cf16dd4cd6ff45d63be6bf11b42ba6b982f09cb03e94b477a84

  • SSDEEP

    768:sP+5KFc8287xvoegxvG0XyYv/WYL2ZvVlmDO:sE2lB7yHyYHWYL2ZNcDO

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ba9d2da65c3fb6005f82002196e75cfd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ba9d2da65c3fb6005f82002196e75cfd.dll,#1
      2⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 "C:\Windows\msvcr.dll",_RunAs@0
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\msvcr.dll

    Filesize

    29KB

    MD5

    ba9d2da65c3fb6005f82002196e75cfd

    SHA1

    d75a9b8100c99f5b09f4262b1f1e38c598bbf7e1

    SHA256

    6690a24c6bcfea493a72257514fd1ec76c8cdd61c7b84f7180ff051d2677c7eb

    SHA512

    d1da5409da379597b62b93bb965effe9b823bf3d9cf6107145eba0d7034610429a0f673b07083cf16dd4cd6ff45d63be6bf11b42ba6b982f09cb03e94b477a84

  • memory/2736-0-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/2736-1-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/2736-7-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/2940-5-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/2940-6-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/2940-8-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB