Analysis

  • max time kernel
    424s
  • max time network
    450s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2023 01:43

General

  • Target

    817c226e42f5c503325288fd8273bc03b326590f457e7a589eb34c2792d0a5db.dll

  • Size

    2.6MB

  • MD5

    fea3a5c2bafa878b95e7084b5a5cb192

  • SHA1

    bc2bd62464ab420e677753ada67f3bb345cf5080

  • SHA256

    817c226e42f5c503325288fd8273bc03b326590f457e7a589eb34c2792d0a5db

  • SHA512

    00d281f0d02619afa27e29faa8cd80ef48a449628308baa31c239c4930a8f3c031dadbb95ba194c3b0e00dba95a33ddd6715991ba9ab4a2daf06b430915c513a

  • SSDEEP

    49152:sVSjcGsSEt3UQjAuD5Pa8G/5Dh+TNbtFs98e:sVYcwOJP67a

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\817c226e42f5c503325288fd8273bc03b326590f457e7a589eb34c2792d0a5db.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\817c226e42f5c503325288fd8273bc03b326590f457e7a589eb34c2792d0a5db.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:6084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 2408
        3⤵
        • Program crash
        PID:4280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6084 -ip 6084
    1⤵
      PID:1608

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/6084-0-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
      Filesize

      4KB

    • memory/6084-1-0x0000000000400000-0x000000000072C000-memory.dmp
      Filesize

      3.2MB

    • memory/6084-16-0x0000000000400000-0x000000000072C000-memory.dmp
      Filesize

      3.2MB

    • memory/6084-21-0x0000000000400000-0x000000000072C000-memory.dmp
      Filesize

      3.2MB

    • memory/6084-22-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
      Filesize

      4KB