Analysis

  • max time kernel
    160s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 21:13

General

  • Target

    cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91.dll

  • Size

    16KB

  • MD5

    b2d302760d4cc62835bac75fd38c8660

  • SHA1

    22e51e5c2333d77931259340215e05d037b77299

  • SHA256

    cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91

  • SHA512

    09d80083a506c23061f8d4032568dd9d955a79eca72055459f2ac3821bc2de1ddf35ec16de400f3e3ec14a550d71609971e35279b20f3da31790b642c06b83f5

  • SSDEEP

    192:AKKxJzfxZUJaXFOI6N3LPqA1zDpf575pl4KKX2Mtw+QkjkFOKpJvZsi6u+zyG:AzdfxWUVrabPqA1neKe2Mt1qPrZsi6kG

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cbeafff2323e852e0081c4a91169ca550edada4bffd392fca6ef2459b1148b91.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1796-132-0x0000000000000000-mapping.dmp