Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 10:46

General

  • Target

    Pkpm2007/dic32.dll

  • Size

    524KB

  • MD5

    2e89d8f9cf51b2275ca999ca18295441

  • SHA1

    836f388aa254abf4ffa26df5cd4e7f4811a5af1b

  • SHA256

    49988e093cb4fbeabf5ea3dcda0b93d508cfa7817f7c00070e7ae3946b90be15

  • SHA512

    16374fc651a8030ace06244bf39dd2a60c3666cee090c1ddd85a25139c2748ad905b7ebe3b434a40ff8c9df188e36c0191b8a952e0a4aaf6146744bd0c945305

  • SSDEEP

    6144:VwSSfS9aakkaoCj6MbJ+QxEE+K0aVwWL4XwNU+IT:VwSSa9aOy+EFpI

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Pkpm2007\dic32.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Pkpm2007\dic32.dll,#1
      2⤵
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-7-0x00000000001E0000-0x0000000000244000-memory.dmp

    Filesize

    400KB

  • memory/2204-6-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-1-0x00000000001E0000-0x0000000000244000-memory.dmp

    Filesize

    400KB

  • memory/2204-8-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-14-0x00000000001E0000-0x0000000000244000-memory.dmp

    Filesize

    400KB

  • memory/2204-24-0x00000000007E0000-0x0000000000844000-memory.dmp

    Filesize

    400KB

  • memory/2204-25-0x00000000007E0000-0x0000000000844000-memory.dmp

    Filesize

    400KB

  • memory/2204-27-0x0000000010000000-0x00000000100CA000-memory.dmp

    Filesize

    808KB

  • memory/2204-30-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-29-0x00000000001E0000-0x0000000000244000-memory.dmp

    Filesize

    400KB

  • memory/2204-21-0x0000000010000000-0x00000000100CA000-memory.dmp

    Filesize

    808KB

  • memory/2204-20-0x0000000010000000-0x00000000100CA000-memory.dmp

    Filesize

    808KB

  • memory/2204-13-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-12-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-11-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-15-0x00000000007E0000-0x0000000000844000-memory.dmp

    Filesize

    400KB

  • memory/2204-10-0x00000000003A0000-0x00000000004AD000-memory.dmp

    Filesize

    1.1MB

  • memory/2204-22-0x0000000010000000-0x00000000100CA000-memory.dmp

    Filesize

    808KB