Analysis

  • max time kernel
    32s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 10:40

General

  • Target

    libGLESv2.dll

  • Size

    7.2MB

  • MD5

    438d089addd02af6f33b42f92cf19489

  • SHA1

    b0de553d91c92e4d104d99a265442fbc51be67de

  • SHA256

    05236819cd357b0f16ed2d8559a3c4da3b153ad7932ec2fd1d8e36d008a8633a

  • SHA512

    0b6774d50becb18f471cbfb86aaa63cd360bb60f6fd77ab93b60c79f5019edcda6ccb23b6a7724f66b6ecedfefc0f0e2d098daee825185a261821903a3bc4fcb

  • SSDEEP

    98304:tB7j4/0BuPMTUDUaG2u/hHZr7f7gsOMOe:b48KPBGzZr7fcsP

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1
    1⤵
      PID:4548
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2252-0-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-1-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-2-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-6-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-7-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-8-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-10-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-9-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-11-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB

    • memory/2252-12-0x0000026431C20000-0x0000026431C21000-memory.dmp

      Filesize

      4KB