Analysis
-
max time kernel
36s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
ecc884ac25f3d5edb3ad6bf35788e9ffa8390059f03404efae398016bfaba986.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecc884ac25f3d5edb3ad6bf35788e9ffa8390059f03404efae398016bfaba986.dll
Resource
win10v2004-20221111-en
General
-
Target
ecc884ac25f3d5edb3ad6bf35788e9ffa8390059f03404efae398016bfaba986.dll
-
Size
33KB
-
MD5
6f2224109f8ad2507fd5e06977252b60
-
SHA1
855504d0fc09e2fbf209c44578ebc6158df8bf74
-
SHA256
ecc884ac25f3d5edb3ad6bf35788e9ffa8390059f03404efae398016bfaba986
-
SHA512
a155239107056b388241f74c921fbfd0cb7fd449a74901e24b052dc53fb59d8cc866ecc8422fe07799b6bd80ce7946924e8fd49e1f2f7598e60b00cce0468f12
-
SSDEEP
768:C+aoi6qZOpQB5ZpOc06HCMN9GT6RJ5BHUEy2YEZZEo:C+av6qZ4QxpP0AtNfRJ5BHxY
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1460 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26 PID 1504 wrote to memory of 1460 1504 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecc884ac25f3d5edb3ad6bf35788e9ffa8390059f03404efae398016bfaba986.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecc884ac25f3d5edb3ad6bf35788e9ffa8390059f03404efae398016bfaba986.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1460
-