Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 04:05
Behavioral task
behavioral1
Sample
2100-81-0x00000000033F0000-0x0000000003521000-memory.dll
Resource
win7-20230831-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2100-81-0x00000000033F0000-0x0000000003521000-memory.dll
Resource
win10v2004-20230915-en
1 signatures
150 seconds
General
-
Target
2100-81-0x00000000033F0000-0x0000000003521000-memory.dll
-
Size
1.2MB
-
MD5
284c192e526e82420bcf81e3940bba02
-
SHA1
4c28c6c6f94bf335f308b28b7a9c8aef28f25a72
-
SHA256
198828ec5c03ed4335959cc93b16e34cb7a0a8e7ba329d4de6e81a714b684064
-
SHA512
129a61f0f89e31e6f36d32cd12b2f8d0616211575b4ea9321c4e7c022d931fef640e6de22050b7c5de55e833854a0fd49376939b4dc6b3964f444c967c0bda80
-
SSDEEP
24576:3C7CI9TZDEWk1wCy0zaG9cQA+1ftxmbfYQJZKiZRy4:7I99DEWVtQA+Zmn0iZ0
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3180 svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2100-81-0x00000000033F0000-0x0000000003521000-memory.dll,#11⤵PID:4248
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3180