Analysis
-
max time kernel
175s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 16:59
Static task
static1
Behavioral task
behavioral1
Sample
37559bade6235f0773a60e9c7414dde6f5d4fc96291eaeee1557b5c56d5d5bdb.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
37559bade6235f0773a60e9c7414dde6f5d4fc96291eaeee1557b5c56d5d5bdb.dll
Resource
win10v2004-20230915-en
General
-
Target
37559bade6235f0773a60e9c7414dde6f5d4fc96291eaeee1557b5c56d5d5bdb.dll
-
Size
6.3MB
-
MD5
11a8860306dc1f96cf2d58354761be85
-
SHA1
f1bc6bcebcee59266bf489673e07eaa348ad28e9
-
SHA256
37559bade6235f0773a60e9c7414dde6f5d4fc96291eaeee1557b5c56d5d5bdb
-
SHA512
19cbd90cad449515437a807b54546339a6759032591d26ee4ec978b180d920226db7398b8e9d34cb258f347e1c103dba2ad119012e6f35a88fded8201aa0d38c
-
SSDEEP
196608:tfpBL/vSSscajFuqvOuCHE5iNx4u1QMmE13iIZ5O:3BL/vTsPIzVki2lq139Zs
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3940 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3940 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3940 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 3940 3768 rundll32.exe 86 PID 3768 wrote to memory of 3940 3768 rundll32.exe 86 PID 3768 wrote to memory of 3940 3768 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37559bade6235f0773a60e9c7414dde6f5d4fc96291eaeee1557b5c56d5d5bdb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37559bade6235f0773a60e9c7414dde6f5d4fc96291eaeee1557b5c56d5d5bdb.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3940
-