Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 06:40
Behavioral task
behavioral1
Sample
75df48ff9fcf40c2199f1120844fb8606b28f352a01dbaf6415316f276240a27.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
75df48ff9fcf40c2199f1120844fb8606b28f352a01dbaf6415316f276240a27.dll
Resource
win10v2004-20231020-en
General
-
Target
75df48ff9fcf40c2199f1120844fb8606b28f352a01dbaf6415316f276240a27.dll
-
Size
50KB
-
MD5
a09c297e4f8a9fd24b62bb89962d54c6
-
SHA1
7caacdf6b134aa933bab8a012eed6ec130fa341d
-
SHA256
75df48ff9fcf40c2199f1120844fb8606b28f352a01dbaf6415316f276240a27
-
SHA512
7d6b5fcb191c496a52e2b654b69a6343b9e59a5946c7604cacde85d98e42e2d6ac5c1b353bf0a33a604e345721cfab4cfee1150364757534b1364461ae8edd60
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5VJYH:W5ReWjTrW9rNPgYovJYH
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2772 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3576 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2772 1504 rundll32.exe 86 PID 1504 wrote to memory of 2772 1504 rundll32.exe 86 PID 1504 wrote to memory of 2772 1504 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75df48ff9fcf40c2199f1120844fb8606b28f352a01dbaf6415316f276240a27.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75df48ff9fcf40c2199f1120844fb8606b28f352a01dbaf6415316f276240a27.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2772
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3576
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58690ec2d6ff9c58df4716aecb0fe42ca
SHA102eefad627a761ff1fb8f856e9ae067df26ae2d8
SHA2567b41c0145f1aedb44e018fed34afd089ee7991646c6b31727d047ef9fb4d35fe
SHA512af560f2c93e1bf63d1d147bb3579a84b0c58054c274c7e7763b011d7a4638eed8890e16f7593c55af94fb8c6b68c0f3a7d1f30a0c49714954e37919b0c78c8a4