Analysis

  • max time kernel
    135s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 21:48

General

  • Target

    Plugins/64bit/GPMDPPlugin.dll

  • Size

    772KB

  • MD5

    7a1e26e397c342ad6f5ec4b8fcf7d2b7

  • SHA1

    3a94e5ffe7b112a9e6aa4e565564d75cb85acd85

  • SHA256

    6a49f30706c514fc9326c6004fd60520c33bf24b587e9b20028033babbc8bcb6

  • SHA512

    0afec3bd0e6ff80d9c111a9441bc3a7aeda4126289bc13a8b8a6d1ee8f7178bc278ae914e145d7f4202e6706d53bc6c5340cd711dfbf46f88605654a7ea8b2fc

  • SSDEEP

    6144:OBssyPvsSEE8g/N/r2uEoPKCL8hnWUISKdefIHT4YjxZAnzQA1a6jhHewUppMTxd:lL/Jr2uL8ip/Syr7f8T/qJuVym/

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Plugins\64bit\GPMDPPlugin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 728
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2184-0-0x000001B050470000-0x000001B050480000-memory.dmp

    Filesize

    64KB

  • memory/2184-1-0x00007FF9EF785000-0x00007FF9EF786000-memory.dmp

    Filesize

    4KB

  • memory/2184-2-0x0000000000160000-0x000000000022A000-memory.dmp

    Filesize

    808KB

  • memory/2184-3-0x00007FF9EF4D0000-0x00007FF9EFE71000-memory.dmp

    Filesize

    9.6MB

  • memory/2184-10-0x00007FF9EF4D0000-0x00007FF9EFE71000-memory.dmp

    Filesize

    9.6MB