Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-10-2023 23:20
Static task
static1
Behavioral task
behavioral1
Sample
43c9c3b3dff509c6900e120b10219bdf404873e869eba96a2b30dd986e743db3.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
43c9c3b3dff509c6900e120b10219bdf404873e869eba96a2b30dd986e743db3.dll
Resource
win10v2004-20230915-en
General
-
Target
43c9c3b3dff509c6900e120b10219bdf404873e869eba96a2b30dd986e743db3.dll
-
Size
3.6MB
-
MD5
a5231a39faadf014705930ad5d113ca3
-
SHA1
46557d391e4368abce6462a9bbb6b5b623ff5ede
-
SHA256
43c9c3b3dff509c6900e120b10219bdf404873e869eba96a2b30dd986e743db3
-
SHA512
09f2addfce1f24d5aaaf73d045e688cc7e02ff46c86637c8c28d21849d59e963972ced90de8624c2a768c0c4efd2a8902cda77453848fc3d30f2b634e2aebec3
-
SSDEEP
49152:iXPwh11sXIAyT9tN93ts5SkP2lS1mdM03aT1P6t:qPs1sByT+5SQrWM03o12
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 2072 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WindowSystemNewUpdate527.log rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2072 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 924 wrote to memory of 2072 924 rundll32.exe 28 PID 924 wrote to memory of 2072 924 rundll32.exe 28 PID 924 wrote to memory of 2072 924 rundll32.exe 28 PID 924 wrote to memory of 2072 924 rundll32.exe 28 PID 924 wrote to memory of 2072 924 rundll32.exe 28 PID 924 wrote to memory of 2072 924 rundll32.exe 28 PID 924 wrote to memory of 2072 924 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43c9c3b3dff509c6900e120b10219bdf404873e869eba96a2b30dd986e743db3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43c9c3b3dff509c6900e120b10219bdf404873e869eba96a2b30dd986e743db3.dll,#12⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2072
-