Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2023 17:44

General

  • Target

    584-325-0x0000000003A10000-0x0000000003B41000-memory.dll

  • Size

    1.2MB

  • MD5

    7525dfb5d2e39b5db26a126b3908994b

  • SHA1

    00660794d5ec321d3c8e26ff5f9096154886277e

  • SHA256

    65bea5f39f1191516f83627161cb38f01f310d546e45caaaa9a94b2c5bc558cd

  • SHA512

    f95148f2c3b7449853f3cfef7c0dff4f70c0b7fa04d17badba936810ee1b1085f5bbb1188429c96ffac9c03b5b9e7ad36a4ab7b6d802220ce3cbc59b8f4c65b1

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA01ftxmbfYQJZKr0Y:7I99DEWVtQA0Zmn0Q

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\584-325-0x0000000003A10000-0x0000000003B41000-memory.dll,#1
    1⤵
      PID:2168
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4720
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4804

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4804-0-0x000001F299840000-0x000001F299850000-memory.dmp

        Filesize

        64KB

      • memory/4804-16-0x000001F299940000-0x000001F299950000-memory.dmp

        Filesize

        64KB

      • memory/4804-32-0x000001F2A1C70000-0x000001F2A1C71000-memory.dmp

        Filesize

        4KB

      • memory/4804-34-0x000001F2A1CA0000-0x000001F2A1CA1000-memory.dmp

        Filesize

        4KB

      • memory/4804-35-0x000001F2A1CA0000-0x000001F2A1CA1000-memory.dmp

        Filesize

        4KB

      • memory/4804-36-0x000001F2A1DB0000-0x000001F2A1DB1000-memory.dmp

        Filesize

        4KB