Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 07:25
Behavioral task
behavioral1
Sample
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll
Resource
win10v2004-20230831-en
General
-
Target
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll
-
Size
2.9MB
-
MD5
f6a3de7e8b71cb93960bc23556a24e04
-
SHA1
af7bd878e6a3145209031b66f9f438ef191d24e9
-
SHA256
a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22
-
SHA512
bfdbe9efb6d252a0da7e62545f0b68a44bcf073f40fdbc492ebbef8c2f03406bac89feeff23b3dfa85f69961205bb1cb9a891047a99b03a199f2076e2b0838e1
-
SSDEEP
49152:/q3jDLMcXShsmWF73/JJYyLOlXm12KcW43dtDgvboZpA8LOkK+v8LIoWw7p0C+V:0vFSmlhYy6W0DrDgkPakK+toWw+
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 22 3520 rundll32.exe 25 3520 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1800 wmic.exe Token: SeSecurityPrivilege 1800 wmic.exe Token: SeTakeOwnershipPrivilege 1800 wmic.exe Token: SeLoadDriverPrivilege 1800 wmic.exe Token: SeSystemProfilePrivilege 1800 wmic.exe Token: SeSystemtimePrivilege 1800 wmic.exe Token: SeProfSingleProcessPrivilege 1800 wmic.exe Token: SeIncBasePriorityPrivilege 1800 wmic.exe Token: SeCreatePagefilePrivilege 1800 wmic.exe Token: SeBackupPrivilege 1800 wmic.exe Token: SeRestorePrivilege 1800 wmic.exe Token: SeShutdownPrivilege 1800 wmic.exe Token: SeDebugPrivilege 1800 wmic.exe Token: SeSystemEnvironmentPrivilege 1800 wmic.exe Token: SeRemoteShutdownPrivilege 1800 wmic.exe Token: SeUndockPrivilege 1800 wmic.exe Token: SeManageVolumePrivilege 1800 wmic.exe Token: 33 1800 wmic.exe Token: 34 1800 wmic.exe Token: 35 1800 wmic.exe Token: 36 1800 wmic.exe Token: SeIncreaseQuotaPrivilege 1800 wmic.exe Token: SeSecurityPrivilege 1800 wmic.exe Token: SeTakeOwnershipPrivilege 1800 wmic.exe Token: SeLoadDriverPrivilege 1800 wmic.exe Token: SeSystemProfilePrivilege 1800 wmic.exe Token: SeSystemtimePrivilege 1800 wmic.exe Token: SeProfSingleProcessPrivilege 1800 wmic.exe Token: SeIncBasePriorityPrivilege 1800 wmic.exe Token: SeCreatePagefilePrivilege 1800 wmic.exe Token: SeBackupPrivilege 1800 wmic.exe Token: SeRestorePrivilege 1800 wmic.exe Token: SeShutdownPrivilege 1800 wmic.exe Token: SeDebugPrivilege 1800 wmic.exe Token: SeSystemEnvironmentPrivilege 1800 wmic.exe Token: SeRemoteShutdownPrivilege 1800 wmic.exe Token: SeUndockPrivilege 1800 wmic.exe Token: SeManageVolumePrivilege 1800 wmic.exe Token: 33 1800 wmic.exe Token: 34 1800 wmic.exe Token: 35 1800 wmic.exe Token: 36 1800 wmic.exe Token: SeIncreaseQuotaPrivilege 1920 wmic.exe Token: SeSecurityPrivilege 1920 wmic.exe Token: SeTakeOwnershipPrivilege 1920 wmic.exe Token: SeLoadDriverPrivilege 1920 wmic.exe Token: SeSystemProfilePrivilege 1920 wmic.exe Token: SeSystemtimePrivilege 1920 wmic.exe Token: SeProfSingleProcessPrivilege 1920 wmic.exe Token: SeIncBasePriorityPrivilege 1920 wmic.exe Token: SeCreatePagefilePrivilege 1920 wmic.exe Token: SeBackupPrivilege 1920 wmic.exe Token: SeRestorePrivilege 1920 wmic.exe Token: SeShutdownPrivilege 1920 wmic.exe Token: SeDebugPrivilege 1920 wmic.exe Token: SeSystemEnvironmentPrivilege 1920 wmic.exe Token: SeRemoteShutdownPrivilege 1920 wmic.exe Token: SeUndockPrivilege 1920 wmic.exe Token: SeManageVolumePrivilege 1920 wmic.exe Token: 33 1920 wmic.exe Token: 34 1920 wmic.exe Token: 35 1920 wmic.exe Token: 36 1920 wmic.exe Token: SeIncreaseQuotaPrivilege 1920 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3520 2264 rundll32.exe 82 PID 2264 wrote to memory of 3520 2264 rundll32.exe 82 PID 2264 wrote to memory of 3520 2264 rundll32.exe 82 PID 3520 wrote to memory of 1800 3520 rundll32.exe 86 PID 3520 wrote to memory of 1800 3520 rundll32.exe 86 PID 3520 wrote to memory of 1800 3520 rundll32.exe 86 PID 3520 wrote to memory of 1920 3520 rundll32.exe 89 PID 3520 wrote to memory of 1920 3520 rundll32.exe 89 PID 3520 wrote to memory of 1920 3520 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a91484a68ad528547f34f130e9e7ef8671d30d3054c534383ef6c64fdf0b8a22.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get processorid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-