Analysis

  • max time kernel
    138s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 22:32

General

  • Target

    Clanwar1.0/ErrHandle.dll

  • Size

    18KB

  • MD5

    d4f8f9c6a166d672f9f50721af0c3353

  • SHA1

    995977b4b077ec4e9b79dad1cff1c51f462690c7

  • SHA256

    924ed66022613617f6587ab9c3cfacfd79f25acf35c6331ef3370ed8d3ba4a67

  • SHA512

    5d2fa5ca7bdb8eeddfb4fbf8328a5e7718a6ea56f21a6e649a01759750b7a4e027b99e8a1f843d140a6563ecc9ffd945e1e7d9c1b1a065783796a5b319dae56c

  • SSDEEP

    384:8e0Uren7UlyRyxgg28YK9TTywubSdvZGRC4JeHO2qmsdgb0OKVBX/Wib:80r6xpAwwPFsRC4sO6rb0OKPu

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Clanwar1.0\ErrHandle.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Clanwar1.0\ErrHandle.dll,#1
      2⤵
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:456
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1220

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads