Resubmissions

14/09/2024, 15:44

240914-s6g9wascjf 7

14/09/2024, 15:40

240914-s4f9sssbld 7

Analysis

  • max time kernel
    61s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 15:40

General

  • Target

    D3DCompiler_47_cor3.dll

  • Size

    4.7MB

  • MD5

    a7349236212b0e5cec2978f2cfa49a1a

  • SHA1

    5abb08949162fd1985b89ffad40aaf5fc769017e

  • SHA256

    a05d04a270f68c8c6d6ea2d23bebf8cd1d5453b26b5442fa54965f90f1c62082

  • SHA512

    c7ff4f9146fefedc199360aa04236294349c881b3865ebc58c5646ad6b3f83fca309de1173f5ebf823a14ba65e5ada77b46f20286d1ea62c37e17adbc9a82d02

  • SSDEEP

    49152:FCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvpiD0N+YEzI4og/RfzHLeHTRhFRNS:EG2QCwmHXnog/pzHAo/A2L

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\D3DCompiler_47_cor3.dll,#1
    1⤵
      PID:1644
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\WriteLimit.xlsx"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      262B

      MD5

      298eee84147657a4af8252da49a72f65

      SHA1

      d91c2a9246f237e261dac1a5f726f5750295ae28

      SHA256

      bfb88020fd6a2d1b00131686205290a39abf63cb2379402a4092fb0f08c8f8d6

      SHA512

      218bf7140d47c933c929824efb08d49149171cad71b1ac469f57a9e7f32ff889efb13ab7c16a34644700ab427385e581d17f0a9d73f34e13c52320c9971e8e2b

    • memory/3836-10-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB

    • memory/3836-12-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB

    • memory/3836-5-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-1-0x00007FFB8402D000-0x00007FFB8402E000-memory.dmp

      Filesize

      4KB

    • memory/3836-4-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-8-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB

    • memory/3836-7-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB

    • memory/3836-6-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB

    • memory/3836-3-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-9-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB

    • memory/3836-2-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-11-0x00007FFB41F80000-0x00007FFB41F90000-memory.dmp

      Filesize

      64KB

    • memory/3836-13-0x00007FFB41F80000-0x00007FFB41F90000-memory.dmp

      Filesize

      64KB

    • memory/3836-0-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-49-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-50-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-52-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-51-0x00007FFB44010000-0x00007FFB44020000-memory.dmp

      Filesize

      64KB

    • memory/3836-53-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

      Filesize

      2.0MB