Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 08:24

General

  • Target

    0ce061279f9044198448f1cbad22cff779d9a656e2011423ed5895a7b7d6e698.dll

  • Size

    2.2MB

  • MD5

    8c4093ee562999250be2a43f779e3891

  • SHA1

    6a3d9e746d816d4a6783e3e07762d3326e5f20d6

  • SHA256

    0ce061279f9044198448f1cbad22cff779d9a656e2011423ed5895a7b7d6e698

  • SHA512

    ba09f853794288046dfc4303744d6719fd4ec3a72251643768e8169fa61b49ff10fa98d385c5006d500eaffecf13228de48011b159fa11737f0d10e4c6a20cf5

  • SSDEEP

    24576:VwsrMlIuyTmeRnY0EHDmO8Nk0/IPH+dzi1RdiU620z55PVI7gxzS5wjdekJ5lrih:VLrrWPWz7U624rDSw/wh

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0ce061279f9044198448f1cbad22cff779d9a656e2011423ed5895a7b7d6e698.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0ce061279f9044198448f1cbad22cff779d9a656e2011423ed5895a7b7d6e698.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads