Analysis
-
max time kernel
248s -
max time network
331s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 00:17
Static task
static1
Behavioral task
behavioral1
Sample
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll
-
Size
159KB
-
MD5
85b57c32bf0cc276bfcd20081ee0a21c
-
SHA1
4d3eb58b49f140dcd3504c790f502e546568b17a
-
SHA256
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d
-
SHA512
c8334b8f719ce5c06b32551ce4a200698c245b106be837f52949c69fee2900e1c4213319e69cc1580ecdb9e4c2bbc3f7b07dcf678b1289db6c6c1b6e16a7bf11
-
SSDEEP
3072:zvKBqW2Ds3vjDzvFZCN77vgttSg8CqFjKnUH:N7vgWg8C9nG
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1484 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 332 wrote to memory of 1484 332 rundll32.exe 28 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29 PID 1484 wrote to memory of 1692 1484 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" /ppiftsvc3⤵PID:1692
-
-