Analysis
-
max time kernel
85s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
b6421a9a5fdb35e2bee77675da3dc4f3ba458bd46b2b7acb29c63a74de5641f3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6421a9a5fdb35e2bee77675da3dc4f3ba458bd46b2b7acb29c63a74de5641f3.dll
Resource
win10v2004-20220901-en
General
-
Target
b6421a9a5fdb35e2bee77675da3dc4f3ba458bd46b2b7acb29c63a74de5641f3.dll
-
Size
33KB
-
MD5
5a0dbbe829ae03d013418bb7edb5a671
-
SHA1
dd7b6b7df912b9f7ad6d9b3cc247cf6cd58b8dba
-
SHA256
b6421a9a5fdb35e2bee77675da3dc4f3ba458bd46b2b7acb29c63a74de5641f3
-
SHA512
9b38f6c215565977a63e61fe2e60247804ea067ab470c313b7dc5bc0da054e91aefde9044f77ba37830af9a5fbced34551e0292585e4a8172950cbfb9fab40bb
-
SSDEEP
768:v+aoi6qZOpQB5ZpOc06HCMN9GT6RJ5BHUEy2YEZZEo:v+av6qZ4QxpP0AtNfRJ5BHxY
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3012 3248 rundll32.exe 13 PID 3248 wrote to memory of 3012 3248 rundll32.exe 13 PID 3248 wrote to memory of 3012 3248 rundll32.exe 13
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6421a9a5fdb35e2bee77675da3dc4f3ba458bd46b2b7acb29c63a74de5641f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6421a9a5fdb35e2bee77675da3dc4f3ba458bd46b2b7acb29c63a74de5641f3.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012
-