Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 06:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c86d86d064e0f862c3c1e0de3ea9df2eb97281176ebbe5dece5acfac5328b7e6.dll
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c86d86d064e0f862c3c1e0de3ea9df2eb97281176ebbe5dece5acfac5328b7e6.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
c86d86d064e0f862c3c1e0de3ea9df2eb97281176ebbe5dece5acfac5328b7e6.dll
-
Size
254KB
-
MD5
616091edd373093204ed61bb198359ec
-
SHA1
413aaaaed39f57888822ae005e2d4a882c62aa10
-
SHA256
c86d86d064e0f862c3c1e0de3ea9df2eb97281176ebbe5dece5acfac5328b7e6
-
SHA512
c49468d365246f2fc1a5e45e21eab9f7715a3bda5f2d1029265196b7c88a760b184ddec204ec54f2b17be376ba9a3fe7cc9e98cd56ef6ff0b35fb5891765c85d
-
SSDEEP
6144:XHXfaIohF43CVE7px3vxEDkChsPK5NK2O6jy7A:n6FZVUppSxhQ6
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 440 wmic.exe Token: SeSecurityPrivilege 440 wmic.exe Token: SeTakeOwnershipPrivilege 440 wmic.exe Token: SeLoadDriverPrivilege 440 wmic.exe Token: SeSystemProfilePrivilege 440 wmic.exe Token: SeSystemtimePrivilege 440 wmic.exe Token: SeProfSingleProcessPrivilege 440 wmic.exe Token: SeIncBasePriorityPrivilege 440 wmic.exe Token: SeCreatePagefilePrivilege 440 wmic.exe Token: SeBackupPrivilege 440 wmic.exe Token: SeRestorePrivilege 440 wmic.exe Token: SeShutdownPrivilege 440 wmic.exe Token: SeDebugPrivilege 440 wmic.exe Token: SeSystemEnvironmentPrivilege 440 wmic.exe Token: SeRemoteShutdownPrivilege 440 wmic.exe Token: SeUndockPrivilege 440 wmic.exe Token: SeManageVolumePrivilege 440 wmic.exe Token: 33 440 wmic.exe Token: 34 440 wmic.exe Token: 35 440 wmic.exe Token: 36 440 wmic.exe Token: SeIncreaseQuotaPrivilege 440 wmic.exe Token: SeSecurityPrivilege 440 wmic.exe Token: SeTakeOwnershipPrivilege 440 wmic.exe Token: SeLoadDriverPrivilege 440 wmic.exe Token: SeSystemProfilePrivilege 440 wmic.exe Token: SeSystemtimePrivilege 440 wmic.exe Token: SeProfSingleProcessPrivilege 440 wmic.exe Token: SeIncBasePriorityPrivilege 440 wmic.exe Token: SeCreatePagefilePrivilege 440 wmic.exe Token: SeBackupPrivilege 440 wmic.exe Token: SeRestorePrivilege 440 wmic.exe Token: SeShutdownPrivilege 440 wmic.exe Token: SeDebugPrivilege 440 wmic.exe Token: SeSystemEnvironmentPrivilege 440 wmic.exe Token: SeRemoteShutdownPrivilege 440 wmic.exe Token: SeUndockPrivilege 440 wmic.exe Token: SeManageVolumePrivilege 440 wmic.exe Token: 33 440 wmic.exe Token: 34 440 wmic.exe Token: 35 440 wmic.exe Token: 36 440 wmic.exe Token: SeIncreaseQuotaPrivilege 2252 wmic.exe Token: SeSecurityPrivilege 2252 wmic.exe Token: SeTakeOwnershipPrivilege 2252 wmic.exe Token: SeLoadDriverPrivilege 2252 wmic.exe Token: SeSystemProfilePrivilege 2252 wmic.exe Token: SeSystemtimePrivilege 2252 wmic.exe Token: SeProfSingleProcessPrivilege 2252 wmic.exe Token: SeIncBasePriorityPrivilege 2252 wmic.exe Token: SeCreatePagefilePrivilege 2252 wmic.exe Token: SeBackupPrivilege 2252 wmic.exe Token: SeRestorePrivilege 2252 wmic.exe Token: SeShutdownPrivilege 2252 wmic.exe Token: SeDebugPrivilege 2252 wmic.exe Token: SeSystemEnvironmentPrivilege 2252 wmic.exe Token: SeRemoteShutdownPrivilege 2252 wmic.exe Token: SeUndockPrivilege 2252 wmic.exe Token: SeManageVolumePrivilege 2252 wmic.exe Token: 33 2252 wmic.exe Token: 34 2252 wmic.exe Token: 35 2252 wmic.exe Token: 36 2252 wmic.exe Token: SeIncreaseQuotaPrivilege 2252 wmic.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2948 wrote to memory of 440 2948 rundll32.exe 86 PID 2948 wrote to memory of 440 2948 rundll32.exe 86 PID 2948 wrote to memory of 2252 2948 rundll32.exe 89 PID 2948 wrote to memory of 2252 2948 rundll32.exe 89 PID 2948 wrote to memory of 2724 2948 rundll32.exe 91 PID 2948 wrote to memory of 2724 2948 rundll32.exe 91 PID 2948 wrote to memory of 4952 2948 rundll32.exe 93 PID 2948 wrote to memory of 4952 2948 rundll32.exe 93 PID 2948 wrote to memory of 1144 2948 rundll32.exe 95 PID 2948 wrote to memory of 1144 2948 rundll32.exe 95 PID 2948 wrote to memory of 404 2948 rundll32.exe 97 PID 2948 wrote to memory of 404 2948 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c86d86d064e0f862c3c1e0de3ea9df2eb97281176ebbe5dece5acfac5328b7e6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic.exe CPU get SerialNumber /value2⤵
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic.exe CPU get ProcessorID /value2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic.exe BASEBOARD get SerialNumber /value2⤵PID:2724
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic.exe BIOS get SerialNumber /value2⤵PID:4952
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic.exe DISKDRIVE where index=0 get SerialNumber /value2⤵PID:1144
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic.exe NIC where 'PhysicalAdapter=TRUE AND NOT Name like "%Virtual%"' get MacAddress /value2⤵PID:404
-