Analysis
-
max time kernel
29s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 12:36
Behavioral task
behavioral1
Sample
1c8b16294b6f5022cf47110a3fa886e9f191ab0f9a18f2942144dee1d8b5e982.dll
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c8b16294b6f5022cf47110a3fa886e9f191ab0f9a18f2942144dee1d8b5e982.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
1c8b16294b6f5022cf47110a3fa886e9f191ab0f9a18f2942144dee1d8b5e982.dll
-
Size
916KB
-
MD5
a1da2d6884de16685053269c19fe248c
-
SHA1
9f503178a750a5a58e4319c800820ed5e829434d
-
SHA256
1c8b16294b6f5022cf47110a3fa886e9f191ab0f9a18f2942144dee1d8b5e982
-
SHA512
7c48829a31d213454396315f32780026849c84a761027770f100b047d68c7015ef61e618004674b3241e5f8e1319ab5c37ff53aa343992213f14dd77c2245aed
-
SSDEEP
24576:r1v8FIOipHz1DM/VFVtj+2jmHrLMcIye5ugOmlqz:uHiBz14/Vd+PMNfOmW
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/908-56-0x0000000010000000-0x0000000010266000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 908 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 908 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1808 wrote to memory of 908 1808 rundll32.exe 28 PID 1808 wrote to memory of 908 1808 rundll32.exe 28 PID 1808 wrote to memory of 908 1808 rundll32.exe 28 PID 1808 wrote to memory of 908 1808 rundll32.exe 28 PID 1808 wrote to memory of 908 1808 rundll32.exe 28 PID 1808 wrote to memory of 908 1808 rundll32.exe 28 PID 1808 wrote to memory of 908 1808 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1c8b16294b6f5022cf47110a3fa886e9f191ab0f9a18f2942144dee1d8b5e982.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1c8b16294b6f5022cf47110a3fa886e9f191ab0f9a18f2942144dee1d8b5e982.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:908
-