Analysis
-
max time kernel
138s -
max time network
75s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
14-08-2020 16:39
Static task
static1
Behavioral task
behavioral1
Sample
3cf5f3676b792e44749030150a0a0f55.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
3cf5f3676b792e44749030150a0a0f55.dll
-
Size
504KB
-
MD5
3cf5f3676b792e44749030150a0a0f55
-
SHA1
8af704ed880f4a85dc33779a716187f2c3ba8e99
-
SHA256
13509b3f6aeacb569938cc1baa474beac1c0e6d1ce222ca681d9d463889babac
-
SHA512
b103583c441d6012969f176603896808eaf4d114be09c992486b0fef7e2c8abaeb899f15c694189317e3b67fa1c4066bfab79d000244ec6ea2f8989f2666b53b
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1476 created 3036 1476 rundll32.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1476 set thread context of 2748 1476 rundll32.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1476 rundll32.exe 1476 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
rundll32.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1476 rundll32.exe Token: SeSecurityPrivilege 2748 msiexec.exe Token: SeSecurityPrivilege 2748 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3288 wrote to memory of 1476 3288 rundll32.exe rundll32.exe PID 3288 wrote to memory of 1476 3288 rundll32.exe rundll32.exe PID 3288 wrote to memory of 1476 3288 rundll32.exe rundll32.exe PID 1476 wrote to memory of 2748 1476 rundll32.exe msiexec.exe PID 1476 wrote to memory of 2748 1476 rundll32.exe msiexec.exe PID 1476 wrote to memory of 2748 1476 rundll32.exe msiexec.exe PID 1476 wrote to memory of 2748 1476 rundll32.exe msiexec.exe PID 1476 wrote to memory of 2748 1476 rundll32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3036
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3cf5f3676b792e44749030150a0a0f55.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3cf5f3676b792e44749030150a0a0f55.dll,#13⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-