Analysis
-
max time kernel
61s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
3d330ceb27410d4c6817da8e3b38b9b30787509f38d5bc7cf53eb9edebe3f1f9.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d330ceb27410d4c6817da8e3b38b9b30787509f38d5bc7cf53eb9edebe3f1f9.dll
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
3d330ceb27410d4c6817da8e3b38b9b30787509f38d5bc7cf53eb9edebe3f1f9.dll
-
Size
505KB
-
MD5
68ca1684637bb6a0a031ffb664b72350
-
SHA1
080627ec95f49d7c69887f793341705c79ec3872
-
SHA256
3d330ceb27410d4c6817da8e3b38b9b30787509f38d5bc7cf53eb9edebe3f1f9
-
SHA512
2d40028de05d759a162ee6a20f878d308fea0eb5f6a7d367b84c2558f7b6f3ac02fd1e9256cc3575cbc7ebdc1a6d3d938eb08532cc7c8b2f04079bda93af4298
-
SSDEEP
12288:6eptOQvOSB/tpjbdAWFqNQTJBhHniXwvV:FjOSBtdbdRN9BsXw9
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4396 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 4396 3704 rundll32.exe 82 PID 3704 wrote to memory of 4396 3704 rundll32.exe 82 PID 3704 wrote to memory of 4396 3704 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d330ceb27410d4c6817da8e3b38b9b30787509f38d5bc7cf53eb9edebe3f1f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d330ceb27410d4c6817da8e3b38b9b30787509f38d5bc7cf53eb9edebe3f1f9.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396
-