Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
22-07-2020 17:01
Static task
static1
Behavioral task
behavioral1
Sample
cYNhXOc.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
cYNhXOc.dll
-
Size
395KB
-
MD5
4aaf7ca556de0be48d9bb5bed405fa88
-
SHA1
b85f9bf19e02f7756ee4aeb32c41d4b117a75045
-
SHA256
de7da2ce5f2d7e5415bc3256cc5b7f97878ae9436497660b9add78829a8650cf
-
SHA512
31911b68c382f04ca332c55274a31a20822b444f51a4ff407901deb686b035e209cf209ab997c03a40341de0ec868e83e701ae0950d577c7aac6f5f654e74c22
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4028 wrote to memory of 2164 4028 rundll32.exe 66 PID 4028 wrote to memory of 2164 4028 rundll32.exe 66 PID 4028 wrote to memory of 2164 4028 rundll32.exe 66 PID 2164 wrote to memory of 2316 2164 rundll32.exe 70 PID 2164 wrote to memory of 2316 2164 rundll32.exe 70 PID 2164 wrote to memory of 2316 2164 rundll32.exe 70 PID 2164 wrote to memory of 2316 2164 rundll32.exe 70 PID 2164 wrote to memory of 2316 2164 rundll32.exe 70 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2164 rundll32.exe Token: SeSecurityPrivilege 2316 msiexec.exe Token: SeSecurityPrivilege 2316 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2164 rundll32.exe 2164 rundll32.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2164 created 3008 2164 rundll32.exe 56 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 2316 2164 rundll32.exe 70 -
Blacklisted process makes network request 3 IoCs
flow pid Process 12 2316 msiexec.exe 14 2316 msiexec.exe 16 2316 msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3008
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cYNhXOc.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cYNhXOc.dll,#13⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:2164
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
PID:2316
-