Analysis

  • max time kernel
    84s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 06:06

General

  • Target

    46ea49a50450ed749d8b12f1839bfd60N.dll

  • Size

    748KB

  • MD5

    46ea49a50450ed749d8b12f1839bfd60

  • SHA1

    e2c5e9609273e413ba639a6a644661fcc8bee744

  • SHA256

    4ff720081e48b0b82a9512703e1bb582890ef8039156dbb80b6bc32c84852a8e

  • SHA512

    453b120dd308cdf7dcc3ded70720acc5cb3172b3d463d661a809649c0d850adb0036400d01291a7ef7bc60bff7264e8927346798be7e0de52aed17a2f5c4d8a0

  • SSDEEP

    12288:mcQHQv+3pNi3g5zkKf+tqddsN9DYuFuTO6tdFRq6xGJOpqBTG0jdh3W/e+:JKQ2a3grfRjsN9DY/7tdy0Gkp+GaE7

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 35 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\46ea49a50450ed749d8b12f1839bfd60N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\46ea49a50450ed749d8b12f1839bfd60N.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3028-0-0x0000000010000000-0x0000000010124000-memory.dmp

          Filesize

          1.1MB

        • memory/3028-5-0x00000000100D7000-0x00000000100D8000-memory.dmp

          Filesize

          4KB

        • memory/3028-4-0x0000000000250000-0x00000000002AA000-memory.dmp

          Filesize

          360KB

        • memory/3028-3-0x0000000010000000-0x0000000010124000-memory.dmp

          Filesize

          1.1MB

        • memory/3028-2-0x0000000010000000-0x0000000010124000-memory.dmp

          Filesize

          1.1MB

        • memory/3028-1-0x0000000010000000-0x0000000010124000-memory.dmp

          Filesize

          1.1MB

        • memory/3028-6-0x0000000010000000-0x0000000010124000-memory.dmp

          Filesize

          1.1MB

        • memory/3028-18-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3028-17-0x00000000035A0000-0x00000000035A1000-memory.dmp

          Filesize

          4KB

        • memory/3028-16-0x0000000003610000-0x0000000003611000-memory.dmp

          Filesize

          4KB

        • memory/3028-15-0x00000000035F0000-0x00000000035F1000-memory.dmp

          Filesize

          4KB

        • memory/3028-14-0x0000000003550000-0x0000000003551000-memory.dmp

          Filesize

          4KB

        • memory/3028-13-0x0000000003400000-0x0000000003401000-memory.dmp

          Filesize

          4KB

        • memory/3028-12-0x0000000003410000-0x0000000003411000-memory.dmp

          Filesize

          4KB

        • memory/3028-11-0x00000000032F0000-0x00000000032F1000-memory.dmp

          Filesize

          4KB

        • memory/3028-10-0x0000000003240000-0x0000000003241000-memory.dmp

          Filesize

          4KB

        • memory/3028-9-0x0000000003140000-0x0000000003141000-memory.dmp

          Filesize

          4KB

        • memory/3028-8-0x0000000003150000-0x0000000003151000-memory.dmp

          Filesize

          4KB

        • memory/3028-7-0x0000000010000000-0x0000000010124000-memory.dmp

          Filesize

          1.1MB