Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 13:23
Behavioral task
behavioral1
Sample
fe290135a95600c430249077ad21e695ef4f57ace3e4a226c52aef905cb81d28.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fe290135a95600c430249077ad21e695ef4f57ace3e4a226c52aef905cb81d28.dll
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
fe290135a95600c430249077ad21e695ef4f57ace3e4a226c52aef905cb81d28.dll
-
Size
51KB
-
MD5
8f0c26d816d4439781c5a90365700089
-
SHA1
ab086c82260ca13016299b4b4969ef0709a59c57
-
SHA256
fe290135a95600c430249077ad21e695ef4f57ace3e4a226c52aef905cb81d28
-
SHA512
5addcb7b75949515f4351df424ded07d84c0c17e40267b4e885054e09291cdea079935da770cede69a936cee031522461185a6886652faabeb4d870a2698038c
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL2JYH5:1dWubF3n9S91BF3fbo6JYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5040 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1852 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 5040 4852 rundll32.exe 81 PID 4852 wrote to memory of 5040 4852 rundll32.exe 81 PID 4852 wrote to memory of 5040 4852 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe290135a95600c430249077ad21e695ef4f57ace3e4a226c52aef905cb81d28.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe290135a95600c430249077ad21e695ef4f57ace3e4a226c52aef905cb81d28.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:5040
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852