Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-02-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
b72cfdc35c770a9c46958de995343effdbf8b75aa991723601979df84c664cff.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b72cfdc35c770a9c46958de995343effdbf8b75aa991723601979df84c664cff.dll
Resource
win10v2004-20221111-en
General
-
Target
b72cfdc35c770a9c46958de995343effdbf8b75aa991723601979df84c664cff.dll
-
Size
2.7MB
-
MD5
8c8cb64337282e5224641907b9f6cbc9
-
SHA1
068793003c7cc39ec13f732a516ba39a92a9fc8a
-
SHA256
b72cfdc35c770a9c46958de995343effdbf8b75aa991723601979df84c664cff
-
SHA512
e4801ba19fbb4a7fccd4c7e80f2f9b76e1af1c679110ec5601bb612a6913013db56ea146b5c3cb6b7ba151fbc19a193c0f88aa3bd4d21b6c3cb428d419542d15
-
SSDEEP
49152:GClvtxigSydazu8xHhGf5qsbLjW1HakRb1GNR+sPHDObjW8pn5ONSnbi3O98BzFR:9lvtxigSydazu8xHhGf5qsbLjW1HakR9
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 916 rundll32.exe 916 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 916 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 916 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 880 wrote to memory of 916 880 rundll32.exe 27 PID 880 wrote to memory of 916 880 rundll32.exe 27 PID 880 wrote to memory of 916 880 rundll32.exe 27 PID 880 wrote to memory of 916 880 rundll32.exe 27 PID 880 wrote to memory of 916 880 rundll32.exe 27 PID 880 wrote to memory of 916 880 rundll32.exe 27 PID 880 wrote to memory of 916 880 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b72cfdc35c770a9c46958de995343effdbf8b75aa991723601979df84c664cff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b72cfdc35c770a9c46958de995343effdbf8b75aa991723601979df84c664cff.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:916
-