Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 14:11

General

  • Target

    e1daf1eb6c0fe8d0096939b90d40c93e.dll

  • Size

    442KB

  • MD5

    e1daf1eb6c0fe8d0096939b90d40c93e

  • SHA1

    65aa8590ff8a4da76e558374bc0a2e4037050930

  • SHA256

    71f73367026c28a32e1e6925c38b88991cd0340ce32aafdbc49ae3f01ffd6534

  • SHA512

    d88fe03a5b9f058aadb514090c11758fb1204720eaf5f0dfb118992b57219bf2b0405d442528ddb5bacf8640104db81e904529a802be37a6ac62743a4dc5fa69

  • SSDEEP

    6144:DKA8+He0qUeSY3Bws4xvEOt/qtCBwNPW7Krypvf0qfsBNOttwHGN4g8J2Wk:EyPPY3BYxvE4ytZt88msBctGHUp

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1daf1eb6c0fe8d0096939b90d40c93e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1daf1eb6c0fe8d0096939b90d40c93e.dll,#1
      2⤵
      • Sets service image path in registry
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\68A2.tmp
        3⤵
        • Loads dropped DLL
        PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\68A2.tmp

    Filesize

    374KB

    MD5

    b49ed0968ec828008936403b113f55c0

    SHA1

    b896e64bd85157f29427ec5916e4340b9e81cb13

    SHA256

    a850cd0a9583055f7deac03f583d26606aa2ce5cac950f5ab6daef4b55b32d53

    SHA512

    3a7b9ee1a5c26e9a6a52e8523e3db610c9194bfa7e6a0e0f98e008aa9aafc1dd9b6470c0a206c8b667436f6928621a7a03e4dcbaf1af4600d7ca91db688466bd

  • memory/2776-9-0x00000000002E0000-0x0000000000336000-memory.dmp

    Filesize

    344KB

  • memory/2900-0-0x0000000000290000-0x0000000000301000-memory.dmp

    Filesize

    452KB

  • memory/2900-3-0x0000000000290000-0x0000000000301000-memory.dmp

    Filesize

    452KB