Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 21:13

General

  • Target

    cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91.dll

  • Size

    16KB

  • MD5

    b2d302760d4cc62835bac75fd38c8660

  • SHA1

    22e51e5c2333d77931259340215e05d037b77299

  • SHA256

    cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91

  • SHA512

    09d80083a506c23061f8d4032568dd9d955a79eca72055459f2ac3821bc2de1ddf35ec16de400f3e3ec14a550d71609971e35279b20f3da31790b642c06b83f5

  • SSDEEP

    192:AKKxJzfxZUJaXFOI6N3LPqA1zDpf575pl4KKX2Mtw+QkjkFOKpJvZsi6u+zyG:AzdfxWUVrabPqA1neKe2Mt1qPrZsi6kG

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-54-0x0000000000000000-mapping.dmp

  • memory/980-55-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

    Filesize

    8KB