Analysis

  • max time kernel
    506s
  • max time network
    515s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    28/03/2024, 16:36

General

  • Target

    Dad.dll

  • Size

    280KB

  • MD5

    78a5b3ed45ce52ea87909626bb410c4c

  • SHA1

    0c23fb20fa3fb542542752300a93082e79d909ca

  • SHA256

    7832c515d7e0198d97733266c34b3ea207c4938fe8877301952ef2ec7efcb1ec

  • SHA512

    11bdd40f8479c2ea075d6c7f749670da72adb9dcec2603942a2443ba5f6ab6544b8624e50ef295503ed86ab65ad893193b71f412817f5b795009e5d19fa97326

  • SSDEEP

    6144:90tg4GkjWAMpLtL4ARTSpkgqlcqs3hHeGfkYYk/ocXNP2BTRiH:Rt2qLhSegi5s3h+GqK9qiH

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 13 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dad.dll, DllUnregisterServer
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dad.dll, DllUnregisterServer
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2964
  • C:\Windows\syswow64\msiexec.exe
    C:\Windows\syswow64\msiexec.exe -z "C:\Users\Admin\Favorites\AMD64 Family 6 Model 13 Stepping 2, AuthenticAMD\Dad.dll"
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    PID:3244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_2E15BAB6A1AAE2A9B9D9C5FDCF28F8C1

    Filesize

    2KB

    MD5

    ad5d384ce59da134017aa16d9e723b2f

    SHA1

    3466f831ef47fbb6ca5304b3c94819a6cddbbb98

    SHA256

    1b4a69ba0a71b33accfc94bc2ca20549e7f62075d73a629c6a9e27b7ee56f033

    SHA512

    f6f66f52dee7414ba064e4ee4fab9f01b433661fb369f2785aca8b0dcd2ca27b906cce700c0ceb49a5cdd4d242ce0a53a4b3a1c7127374cd5f346562dc0d6096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\927F17ECD202447587B28DFA9D9282CB

    Filesize

    600B

    MD5

    63ce41092adc1348ee690310ef452115

    SHA1

    3ade8214ee3d0fb31da5dc42c34f9702123cc392

    SHA256

    6298d10d700c58e7c955fe7830700dd6df84c262c7a0c32afa665493f4ddfcda

    SHA512

    4d1e7509df276da9cb4447cb682c4e6c548f27f70bccbfb43bc69dead23a2bb77e9f601ef5e18280c4116d6afe705eff5df95a15cdb4139db83a51cb868c967f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    a1c7f961897f869c9959204ae11d6544

    SHA1

    cf767aefdbe7e6c00197d0ac69c643af064ce39d

    SHA256

    3fdacc842ab4eb69b75508ff863743e8a7d0e75b981dfcef12d818778d583335

    SHA512

    d866c85c8154f3b07fea09d8ebc15bc9b5f5581965d83a17bc8d86937951729c71d37cbbb3fd9b6da7f72465125b7b7592cba430124a2b4a4d3d307976d6f54b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_2E15BAB6A1AAE2A9B9D9C5FDCF28F8C1

    Filesize

    484B

    MD5

    175302187cb1ada1803f970530c0625e

    SHA1

    e0555bc1557021ce33465283907f014afa059f87

    SHA256

    1ff92d1865040ec458827801e029e66e8a594f95da27bac6cdbd90e46d3ff517

    SHA512

    b20d5b56616b2ce49ba36013d67f1f4727978820282fd11defab69e045728992596d362d12db7847d0bd13860fac96f0e4228e2a2a26e20258bd1374b3c38b1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\927F17ECD202447587B28DFA9D9282CB

    Filesize

    508B

    MD5

    9490d61f24060bffc2b2d31578049c3e

    SHA1

    2f2555979e92cd764819d1758a814d6c079d223e

    SHA256

    e63a73632e52359403374281df4ae3bf854e6d50d249ddd6a51802979caefb46

    SHA512

    7985806e5e15d60399aafe200e9daa063d290eeca7bb1e57bde7561d055713fde50d72fc34bfa99c5ae1d16bdaeab02ea0c16265bb3da3b5bea0b5500b597795

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    e4ee738dff976799c42416c2458dc8bf

    SHA1

    3bc385b53a1fca30801f2b64efdb40102926758f

    SHA256

    fe40eb2e405387a397ac5602c7675e0d4921b5bbdb64149877ed4b1a264e9952

    SHA512

    c962d2038a699c8c9f458a03e457d732a299c3e04054ca81db63687b13297152fbdb146cacf15d23ea87604591e9f6e6ba053d8a98ee980d1b1c07356054f695

  • C:\Users\Admin\Favorites\AMD64 Family 6 Model 13 Stepping 2, AuthenticAMD\Dad.dll

    Filesize

    280KB

    MD5

    78a5b3ed45ce52ea87909626bb410c4c

    SHA1

    0c23fb20fa3fb542542752300a93082e79d909ca

    SHA256

    7832c515d7e0198d97733266c34b3ea207c4938fe8877301952ef2ec7efcb1ec

    SHA512

    11bdd40f8479c2ea075d6c7f749670da72adb9dcec2603942a2443ba5f6ab6544b8624e50ef295503ed86ab65ad893193b71f412817f5b795009e5d19fa97326

  • memory/2964-23-0x000000007F220000-0x000000007F2A7000-memory.dmp

    Filesize

    540KB

  • memory/3244-32-0x000000007F060000-0x000000007F0E7000-memory.dmp

    Filesize

    540KB

  • memory/3244-33-0x000000007F060000-0x000000007F0E7000-memory.dmp

    Filesize

    540KB

  • memory/3244-34-0x000000007F060000-0x000000007F0E7000-memory.dmp

    Filesize

    540KB