Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 03:24

General

  • Target

    DllEmForm.dll

  • Size

    983KB

  • MD5

    a34dafb1e632e35390b81ff0673942d9

  • SHA1

    83cc173de09df232b5cb1c91ce11de5f5a1bf801

  • SHA256

    0604017d7e9948b804b678f7a3b3045cb15dba881bac8d2e347e5451579c2f65

  • SHA512

    50e8734b285d3ae5c4cd93e55bc29d57e208aafc721892e200ab590ae53cbbe5bc58c37beb0b1bd6432ab7cf13efd7c21c9df49e16661121ca6afc8f6be7e677

  • SSDEEP

    24576:0nPylR468BBvId775btUXf2ysKR3JSHFlvj:0nqj468BBvSXyHWX

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\DllEmForm.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\DllEmForm.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      PID:4016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 744
        3⤵
        • Program crash
        PID:4940
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4016 -ip 4016
    1⤵
      PID:1720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4016-0-0x0000000000400000-0x00000000006C3000-memory.dmp

      Filesize

      2.8MB

    • memory/4016-1-0x0000000002E00000-0x0000000002E4B000-memory.dmp

      Filesize

      300KB

    • memory/4016-2-0x0000000002F70000-0x0000000002F71000-memory.dmp

      Filesize

      4KB

    • memory/4016-4-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

      Filesize

      4KB

    • memory/4016-3-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

      Filesize

      4KB

    • memory/4016-6-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

      Filesize

      4KB

    • memory/4016-5-0x0000000002F80000-0x0000000002F81000-memory.dmp

      Filesize

      4KB

    • memory/4016-7-0x0000000002F60000-0x0000000002F61000-memory.dmp

      Filesize

      4KB

    • memory/4016-9-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

      Filesize

      4KB

    • memory/4016-8-0x00000000035A0000-0x00000000035A1000-memory.dmp

      Filesize

      4KB

    • memory/4016-10-0x0000000003590000-0x0000000003592000-memory.dmp

      Filesize

      8KB

    • memory/4016-11-0x0000000003060000-0x0000000003061000-memory.dmp

      Filesize

      4KB

    • memory/4016-13-0x0000000003050000-0x0000000003051000-memory.dmp

      Filesize

      4KB

    • memory/4016-12-0x0000000003030000-0x0000000003031000-memory.dmp

      Filesize

      4KB

    • memory/4016-14-0x0000000003000000-0x0000000003001000-memory.dmp

      Filesize

      4KB

    • memory/4016-15-0x0000000003020000-0x0000000003021000-memory.dmp

      Filesize

      4KB

    • memory/4016-16-0x0000000003070000-0x0000000003071000-memory.dmp

      Filesize

      4KB

    • memory/4016-17-0x0000000003040000-0x0000000003041000-memory.dmp

      Filesize

      4KB

    • memory/4016-19-0x0000000003100000-0x0000000003101000-memory.dmp

      Filesize

      4KB

    • memory/4016-18-0x00000000030E0000-0x00000000030E1000-memory.dmp

      Filesize

      4KB

    • memory/4016-20-0x00000000030F0000-0x00000000030F1000-memory.dmp

      Filesize

      4KB

    • memory/4016-22-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/4016-21-0x00000000030B0000-0x00000000030B1000-memory.dmp

      Filesize

      4KB

    • memory/4016-23-0x0000000003010000-0x0000000003011000-memory.dmp

      Filesize

      4KB

    • memory/4016-24-0x0000000003600000-0x0000000003700000-memory.dmp

      Filesize

      1024KB

    • memory/4016-25-0x0000000003600000-0x0000000003700000-memory.dmp

      Filesize

      1024KB

    • memory/4016-26-0x0000000003600000-0x0000000003700000-memory.dmp

      Filesize

      1024KB

    • memory/4016-28-0x0000000001370000-0x0000000001371000-memory.dmp

      Filesize

      4KB

    • memory/4016-27-0x0000000001360000-0x0000000001361000-memory.dmp

      Filesize

      4KB

    • memory/4016-29-0x00000000035D0000-0x00000000035D1000-memory.dmp

      Filesize

      4KB

    • memory/4016-30-0x00000000035C0000-0x00000000035C1000-memory.dmp

      Filesize

      4KB

    • memory/4016-31-0x00000000035B0000-0x00000000035B1000-memory.dmp

      Filesize

      4KB

    • memory/4016-32-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

      Filesize

      4KB

    • memory/4016-33-0x00000000035E0000-0x00000000035E1000-memory.dmp

      Filesize

      4KB

    • memory/4016-34-0x0000000000400000-0x00000000006C3000-memory.dmp

      Filesize

      2.8MB

    • memory/4016-35-0x0000000002E00000-0x0000000002E4B000-memory.dmp

      Filesize

      300KB