Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 09:59
Behavioral task
behavioral1
Sample
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8.dll
-
Size
340KB
-
MD5
6ef7c427280a283ebbd0736d0caafb1b
-
SHA1
f9fa49f868caf4da1b4a2e2a67d402b893bfa372
-
SHA256
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8
-
SHA512
7d934e9878e270699895dfbea65dfdc95c93c1ab0c87ed805210430bf74266600a709e9e1b06b16ab409c7f1c7b3befb77a7b829e2c54df4f55d5a7396b1f6c9
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\rundll32.exe: $TASK rundll32.exe File opened for modification C:\Windows\system32\rundll32.exe: $FILE rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1492 taskeng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 304 1492 taskeng.exe 30 PID 1492 wrote to memory of 304 1492 taskeng.exe 30 PID 1492 wrote to memory of 304 1492 taskeng.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8.dll,#11⤵
- Drops file in System32 directory
PID:944
-
C:\Windows\system32\taskeng.exetaskeng.exe {5ABD4C6F-22DC-47B0-A750-B20C31ED33AB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe -u2⤵PID:304
-