Analysis
-
max time kernel
23s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-02-2022 17:17
Static task
static1
Behavioral task
behavioral1
Sample
2f2670e8a7845cf300320415c6a16ffc34e662672f16d7cfcf5b911d088516d9.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2f2670e8a7845cf300320415c6a16ffc34e662672f16d7cfcf5b911d088516d9.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
2f2670e8a7845cf300320415c6a16ffc34e662672f16d7cfcf5b911d088516d9.dll
-
Size
358KB
-
MD5
8bb66e279a58af871180adbb29e41f4f
-
SHA1
446cfe9fa815951085e4e587dd272911b9e5d32b
-
SHA256
2f2670e8a7845cf300320415c6a16ffc34e662672f16d7cfcf5b911d088516d9
-
SHA512
bb114ac54bcc95f1b465ec33400eead469ca97b5f9b8115bc9eb8016f07fa568cf2d0ef570d3f7b1301a44f1daf19b4c8e279fab892facd750601a45b6788204
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 4744 svchost.exe Token: SeCreatePagefilePrivilege 4744 svchost.exe Token: SeShutdownPrivilege 4744 svchost.exe Token: SeCreatePagefilePrivilege 4744 svchost.exe Token: SeShutdownPrivilege 4744 svchost.exe Token: SeCreatePagefilePrivilege 4744 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 644 536 rundll32.exe 82 PID 536 wrote to memory of 644 536 rundll32.exe 82 PID 536 wrote to memory of 644 536 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f2670e8a7845cf300320415c6a16ffc34e662672f16d7cfcf5b911d088516d9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f2670e8a7845cf300320415c6a16ffc34e662672f16d7cfcf5b911d088516d9.dll,#12⤵PID:644
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4744