Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 06:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
84e5da8eec3afa4790e8838bbb850ed70a4b3f71f0f37fa506f4e75b0c5648c1.dll
Resource
win7-20230712-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
84e5da8eec3afa4790e8838bbb850ed70a4b3f71f0f37fa506f4e75b0c5648c1.dll
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
84e5da8eec3afa4790e8838bbb850ed70a4b3f71f0f37fa506f4e75b0c5648c1.dll
-
Size
1.1MB
-
MD5
fbb2b78d86dbe9b42057f3a73c8954c2
-
SHA1
dc6143adee978c2c0d335291be7df2f87c781f2a
-
SHA256
84e5da8eec3afa4790e8838bbb850ed70a4b3f71f0f37fa506f4e75b0c5648c1
-
SHA512
1ee01e2f72e20b6cfd67bbb01ad2e0309d9d4a39ccfd62ed3b4eb66c433340e5efda2f386c5127405071666ae4868dd0ddf030693e30124007b819e0e5f65bce
-
SSDEEP
24576:ALP24reScfgQb5bpO1g253h+ZBO1NRsIiv:AAjpbx25Rza
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 3028 rundll32.exe 3 3028 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3028 rundll32.exe 3028 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 rundll32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3028 2772 rundll32.exe 28 PID 2772 wrote to memory of 3028 2772 rundll32.exe 28 PID 2772 wrote to memory of 3028 2772 rundll32.exe 28 PID 2772 wrote to memory of 3028 2772 rundll32.exe 28 PID 2772 wrote to memory of 3028 2772 rundll32.exe 28 PID 2772 wrote to memory of 3028 2772 rundll32.exe 28 PID 2772 wrote to memory of 3028 2772 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84e5da8eec3afa4790e8838bbb850ed70a4b3f71f0f37fa506f4e75b0c5648c1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84e5da8eec3afa4790e8838bbb850ed70a4b3f71f0f37fa506f4e75b0c5648c1.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3028
-