Analysis
-
max time kernel
18s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:58
Behavioral task
behavioral1
Sample
31acb8e5279b4f865222e36f092791898465574362307cd5b1a2f44faa747dd1.dll
Resource
win7-20221111-en
5 signatures
150 seconds
General
-
Target
31acb8e5279b4f865222e36f092791898465574362307cd5b1a2f44faa747dd1.dll
-
Size
492KB
-
MD5
ecfb659f709eb14f1e0a79b836c67bb0
-
SHA1
c6f0df6eaabc19662bdf900b7f60e3ba698ee440
-
SHA256
31acb8e5279b4f865222e36f092791898465574362307cd5b1a2f44faa747dd1
-
SHA512
ae8c07401450c339c5802585a62786c3fe2f508f69b389e114a33da0cb6aeb7934a9db23b5f62a86d7d64364480115cfe89204aa01452db7b418eeec17392889
-
SSDEEP
12288:x8jY6blqkTq4G63E7WlzhFf6NugNVJJR/dU2p+:YtjXPf6NugDRz
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1788-56-0x00000000003B0000-0x0000000000510000-memory.dmp upx behavioral1/memory/1788-57-0x00000000003B0000-0x0000000000510000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1788 rundll32.exe 1788 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1788 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 940 wrote to memory of 1788 940 rundll32.exe 28 PID 940 wrote to memory of 1788 940 rundll32.exe 28 PID 940 wrote to memory of 1788 940 rundll32.exe 28 PID 940 wrote to memory of 1788 940 rundll32.exe 28 PID 940 wrote to memory of 1788 940 rundll32.exe 28 PID 940 wrote to memory of 1788 940 rundll32.exe 28 PID 940 wrote to memory of 1788 940 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31acb8e5279b4f865222e36f092791898465574362307cd5b1a2f44faa747dd1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31acb8e5279b4f865222e36f092791898465574362307cd5b1a2f44faa747dd1.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-