Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 14:26

General

  • Target

    ccff78dc2bb8dad3ea16a7730c955774e552b4f004ec6941b59f8c31e5834689.dll

  • Size

    109KB

  • MD5

    1768b5cbbb9661b9a63c62d432af4f1f

  • SHA1

    40473cf43b5a5e4c173b691451835756fdeec285

  • SHA256

    ccff78dc2bb8dad3ea16a7730c955774e552b4f004ec6941b59f8c31e5834689

  • SHA512

    8edf090077a492fecc600fde1d3e52b96a3c9008aa32f3c78a528827e33b22b02201b3ec16ea5e6309f2bd3c3a5aad011ae1e45561a5131855a042e9c972529e

  • SSDEEP

    3072:FD8APzVS69hnPbBWrmQ2OIVPBNOJvW4BEuK:P559AmQloLWO4

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ccff78dc2bb8dad3ea16a7730c955774e552b4f004ec6941b59f8c31e5834689.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ccff78dc2bb8dad3ea16a7730c955774e552b4f004ec6941b59f8c31e5834689.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1620-55-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB