Resubmissions
05-02-2022 12:51
220205-p3t8gsbeb2 10Analysis
-
max time kernel
22s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-02-2022 12:51
Static task
static1
Behavioral task
behavioral1
Sample
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll
-
Size
421KB
-
MD5
897827f98772919254d6b257d8b8fc11
-
SHA1
3752186f6b38c55aa49aa9cbc895fbbe4328b869
-
SHA256
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df
-
SHA512
e0a82d23955bbb9716f5fabf6007e9086d466aac2f0606347bf4234e16119bbfe8b9cb45ef3ba7a93acd9f915785245c383f53d1c662dfe2253d26c5f6e92bba
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3300 svchost.exe Token: SeCreatePagefilePrivilege 3300 svchost.exe Token: SeShutdownPrivilege 3300 svchost.exe Token: SeCreatePagefilePrivilege 3300 svchost.exe Token: SeShutdownPrivilege 3300 svchost.exe Token: SeCreatePagefilePrivilege 3300 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4892 3020 rundll32.exe 82 PID 3020 wrote to memory of 4892 3020 rundll32.exe 82 PID 3020 wrote to memory of 4892 3020 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll,#12⤵PID:4892
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3300