Overview
overview
5Static
static
10598e1af64...b1.dll
windows7-x64
10598e1af64...b1.dll
windows10-2004-x64
5092c344330...e0.dll
windows7-x64
1092c344330...e0.dll
windows10-2004-x64
5407eb23a1b...69.dll
windows7-x64
1407eb23a1b...69.dll
windows10-2004-x64
55671b3a89c...15.dll
windows7-x64
15671b3a89c...15.dll
windows10-2004-x64
1f270202cd8...a7.dll
windows7-x64
1f270202cd8...a7.dll
windows10-2004-x64
5Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 13:08
Static task
static1
Behavioral task
behavioral1
Sample
0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
092c344330bd5cba71377dead11946f7277f2dd4af57f5b636b70b343bc7ebe0.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
092c344330bd5cba71377dead11946f7277f2dd4af57f5b636b70b343bc7ebe0.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
407eb23a1b18efa17c38e9c0d914306c145a2b77b562d4e1077a823190434369.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
407eb23a1b18efa17c38e9c0d914306c145a2b77b562d4e1077a823190434369.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
5671b3a89c0e88a9bfb0bd5bc434fa5245578becfdeb284f4796f65eecbd6f15.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
5671b3a89c0e88a9bfb0bd5bc434fa5245578becfdeb284f4796f65eecbd6f15.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7.dll
Resource
win10v2004-20230915-en
General
-
Target
0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1.dll
-
Size
280KB
-
MD5
a17d21baa4329d6affb6f0436efc3ce2
-
SHA1
12494915133ec45c8fd69ce7ce8c20cb53397f50
-
SHA256
0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1
-
SHA512
126fe72ce70a317dc96b5bd62c380a9db69f8602559d892cec68652683d66c3ed54d525b3854acb32a2a0a6c7f31ae22b0e4c4920235c958bc3eef2d61cbe1b7
-
SSDEEP
6144:otcSy3m09/6W2fL0jSH8Lns/wHAridF5n8lxFUF/Mhs1agQkk6eG8R:Uu/6LuJLns6Ari67FUFMs1agQkaGO
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 868 set thread context of 5072 868 rundll32.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5072 WWAHost.exe 5072 WWAHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 868 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5072 WWAHost.exe Token: SeManageVolumePrivilege 964 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 868 wrote to memory of 5072 868 rundll32.exe 85 PID 868 wrote to memory of 5072 868 rundll32.exe 85 PID 868 wrote to memory of 5072 868 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\system32\WWAHost.exeC:\Windows\system32\WWAHost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:964