Analysis
-
max time kernel
152s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3501e79ec7be796910144a4064615a452c82ec8df09abad8aa9d532b8f86344b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3501e79ec7be796910144a4064615a452c82ec8df09abad8aa9d532b8f86344b.dll
Resource
win10v2004-20221111-en
General
-
Target
3501e79ec7be796910144a4064615a452c82ec8df09abad8aa9d532b8f86344b.dll
-
Size
740KB
-
MD5
fbf3acbdf7d45318805d58120d5e1c96
-
SHA1
beebc9d7ebb211616601f33d43824bf4d1b31608
-
SHA256
3501e79ec7be796910144a4064615a452c82ec8df09abad8aa9d532b8f86344b
-
SHA512
cec5fe9a37cee7aa049dfd87b724a984389937b642d4f1559d2140e6474d51fb5444a6d52d56f1c4d7fd7d1a352c3bfbc4f1ba2284a87ecdca72a51ce5216f1b
-
SSDEEP
12288:oizeM2EUEUZ3jY19ZRsoAm8itozrIHMlu4FLpOjWtGNgDUiWqWNKDrt2x:oiqM2CTZKHtitP4FVOjWcCDUiWBwrkx
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 rundll32.exe -
Suspicious use of SetWindowsHookEx 61 IoCs
pid Process 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2032 1776 rundll32.exe 28 PID 1776 wrote to memory of 2032 1776 rundll32.exe 28 PID 1776 wrote to memory of 2032 1776 rundll32.exe 28 PID 1776 wrote to memory of 2032 1776 rundll32.exe 28 PID 1776 wrote to memory of 2032 1776 rundll32.exe 28 PID 1776 wrote to memory of 2032 1776 rundll32.exe 28 PID 1776 wrote to memory of 2032 1776 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3501e79ec7be796910144a4064615a452c82ec8df09abad8aa9d532b8f86344b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3501e79ec7be796910144a4064615a452c82ec8df09abad8aa9d532b8f86344b.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2032
-