Analysis

  • max time kernel
    194s
  • max time network
    217s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 13:31

General

  • Target

    ca5168b9b7227331eab288524d0b73b3ecafeff1eb68ddca73011bf13149e72c.dll

  • Size

    33KB

  • MD5

    a0f2403ac45886b791917ab19b1831d0

  • SHA1

    4a762133d7c83a11ea341623076211955469f6ef

  • SHA256

    ca5168b9b7227331eab288524d0b73b3ecafeff1eb68ddca73011bf13149e72c

  • SHA512

    97696a49758b977a7435f6d983db1ac50271dc6f937771f5bfb4f774f78fa9671d7bc740da061d5cb132900c22fa48de23f4b417511ef435d1890e3fb97a8eee

  • SSDEEP

    768:m+aoi6qZOpQB5ZpOc06HCMN9GT6RJ5BHUEy2YEZZEo:m+av6qZ4QxpP0AtNfRJ5BHxY

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ca5168b9b7227331eab288524d0b73b3ecafeff1eb68ddca73011bf13149e72c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ca5168b9b7227331eab288524d0b73b3ecafeff1eb68ddca73011bf13149e72c.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2796

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads