Overview
overview
9Static
static
9madCHook.dll
windows7-x64
1madCHook.dll
windows10-2004-x64
1setup_C.cmd
windows7-x64
4setup_C.cmd
windows10-2004-x64
4setup_D.cmd
windows7-x64
1setup_D.cmd
windows10-2004-x64
1shfmi.exe
windows7-x64
8shfmi.exe
windows10-2004-x64
8shfres.dll
windows7-x64
8shfres.dll
windows10-2004-x64
8Analysis
-
max time kernel
184s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:12
Behavioral task
behavioral1
Sample
madCHook.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
madCHook.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
setup_C.cmd
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
setup_C.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
setup_D.cmd
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
setup_D.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
shfmi.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
shfmi.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
shfres.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
shfres.dll
Resource
win10v2004-20221111-en
General
-
Target
madCHook.dll
-
Size
123KB
-
MD5
369d077a89a03823debf94ed5e0dfcd1
-
SHA1
a14bdc948373e84b24798e20a7e91d59ad67c8ba
-
SHA256
a9a1e9fa16890d4b51b514adddec3e5592fbf2ee25611029c67c813225c54ee9
-
SHA512
5506c4f8022fc9d607f86e59e1aceab2c29c6eac721604e308fb6e26134a88061c06929e5a13409555e660d4e957943306e7cc35eb917bd262496726926ac5b5
-
SSDEEP
3072:Yfx6nz7ixioxKHncfwUi8yqEZ6vMDPYnDa+nER:2x6z7ixrC/qfnDa+n
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
rundll32.exedescription pid process Token: SeIncreaseQuotaPrivilege 1668 rundll32.exe Token: SeSecurityPrivilege 1668 rundll32.exe Token: SeTakeOwnershipPrivilege 1668 rundll32.exe Token: SeLoadDriverPrivilege 1668 rundll32.exe Token: SeSystemProfilePrivilege 1668 rundll32.exe Token: SeSystemtimePrivilege 1668 rundll32.exe Token: SeProfSingleProcessPrivilege 1668 rundll32.exe Token: SeIncBasePriorityPrivilege 1668 rundll32.exe Token: SeCreatePagefilePrivilege 1668 rundll32.exe Token: SeShutdownPrivilege 1668 rundll32.exe Token: SeDebugPrivilege 1668 rundll32.exe Token: SeSystemEnvironmentPrivilege 1668 rundll32.exe Token: SeRemoteShutdownPrivilege 1668 rundll32.exe Token: SeUndockPrivilege 1668 rundll32.exe Token: SeManageVolumePrivilege 1668 rundll32.exe Token: 33 1668 rundll32.exe Token: 34 1668 rundll32.exe Token: 35 1668 rundll32.exe Token: 36 1668 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1368 wrote to memory of 1668 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1668 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1668 1368 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\madCHook.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\madCHook.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668