Analysis
-
max time kernel
126s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 11:52
Static task
static1
Behavioral task
behavioral1
Sample
e3a16de94ab18afae71801609f7a065a79841a2359d1faba523d923de3746ecd.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e3a16de94ab18afae71801609f7a065a79841a2359d1faba523d923de3746ecd.dll
Resource
win10v2004-20230915-en
General
-
Target
e3a16de94ab18afae71801609f7a065a79841a2359d1faba523d923de3746ecd.dll
-
Size
3.3MB
-
MD5
f940c54cfa89b7012c8ad88be6aba5d1
-
SHA1
267857bfb4a0dec48964de4a112d20ed6816d48a
-
SHA256
e3a16de94ab18afae71801609f7a065a79841a2359d1faba523d923de3746ecd
-
SHA512
be73b6c1252344032f774f582aa7fcabf5b04beed865aad5170e61565ff2814dbcdd8a630ce4fd260e52436ae970e473c1304a0f54ec6fd84d099893af9d9ab3
-
SSDEEP
49152:pB3EIIvjFNVrb/TLvO90d7HjmAFd4A64nsfJ2D0D1sVYgLiL9Yy42qwCggO:GNJp2XCO
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 whoami.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2544 1988 rundll32.exe 82 PID 1988 wrote to memory of 2544 1988 rundll32.exe 82 PID 2544 wrote to memory of 1956 2544 cmd.exe 83 PID 2544 wrote to memory of 1956 2544 cmd.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3a16de94ab18afae71801609f7a065a79841a2359d1faba523d923de3746ecd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.execmd.exe /c whoami2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-