Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 14:15

General

  • Target

    1e8206d63107329f166d7c56caef3ebd747c05a57c12cf7eb68773f90b64e073.dll

  • Size

    161KB

  • MD5

    7ba959d4c3aba40f4b020f11da766b00

  • SHA1

    c45dba48d651851d1a90623029af56280a98bab1

  • SHA256

    1e8206d63107329f166d7c56caef3ebd747c05a57c12cf7eb68773f90b64e073

  • SHA512

    958a599676feca4b76e4f8b1e9dc33e658448bcfb89cfbf6e8fda28b6f321eda7ea8cb6281f63b936b106a1dbab817aaa1ac7f5ab121e493bd9bba348f532a0c

  • SSDEEP

    3072:1xZfJ+pfkIBEO+5Khl/G8KeOLLQqU8z2mm2PLn35v:1ZSsIBv+Wl/G845rL

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e8206d63107329f166d7c56caef3ebd747c05a57c12cf7eb68773f90b64e073.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e8206d63107329f166d7c56caef3ebd747c05a57c12cf7eb68773f90b64e073.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads