Analysis

  • max time kernel
    64s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2022 10:13

General

  • Target

    iUjs]pƹuΫ X-Mouse Button Control K��.dll

  • Size

    364KB

  • MD5

    61c5b19137499097252b3ff045f58c51

  • SHA1

    a6e09564da5610b42f291d10ea414e4b79b5731d

  • SHA256

    cb2a47787fcda96511a434e82a07a7be03fb7733667dc1a5975b5226730565c5

  • SHA512

    b2379c840887a4cf3c7cc98cfd1497f1d39eacb66077e4a49a55a6e2a91dc5fc068ef3feb5d59feb6717edc7c65610be49d2c07845dd4ee24e445a66fa509ef7

  • SSDEEP

    6144:4v+VkJpn893Q9eg3rX9FudjTLNjGGtOCi5TBObX:4vfJp8pQ9eg3rX9FudjxqTk

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\iUjs]pƹuΫ X-Mouse Button Control K��.dll",#1
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads