Analysis
-
max time kernel
61s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-12-2020 17:00
Behavioral task
behavioral1
Sample
sample.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
sample.dll
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
rundll32.exedescription ioc Process File opened for modification C:\Windows\system32\rundll32.exe: $TASK rundll32.exe File opened for modification C:\Windows\system32\rundll32.exe: $FILE rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskeng.exedescription pid Process Token: SeIncBasePriorityPrivilege 1252 taskeng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
taskeng.exedescription pid Process procid_target PID 1252 wrote to memory of 1588 1252 taskeng.exe 30 PID 1252 wrote to memory of 1588 1252 taskeng.exe 30 PID 1252 wrote to memory of 1588 1252 taskeng.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample.dll,#11⤵
- Drops file in System32 directory
PID:740
-
C:\Windows\system32\taskeng.exetaskeng.exe {C1EE01A2-F59D-472A-9755-D8FAF8818317} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe -u2⤵PID:1588
-