Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 00:47
Static task
static1
Behavioral task
behavioral1
Sample
9b0243f1995416121b5e7321f40f891a30082f09cd6f9d94c75a7281c60a093a.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
9b0243f1995416121b5e7321f40f891a30082f09cd6f9d94c75a7281c60a093a.dll
Resource
win10v2004-20231025-en
General
-
Target
9b0243f1995416121b5e7321f40f891a30082f09cd6f9d94c75a7281c60a093a.dll
-
Size
836KB
-
MD5
ab9fd6fa3ba26bc79422939619b8294b
-
SHA1
8a20b40ce462f335955cb66e2b3091dc6bcbfcdb
-
SHA256
9b0243f1995416121b5e7321f40f891a30082f09cd6f9d94c75a7281c60a093a
-
SHA512
4dc0065edf1768eec4ad598fe57d5bea9dd41fa334f8ec9644394487d930b78a5dab5bc53251faf429d301e679feeb5c56c1fa01538d797c0dbf9eaa6c0f9480
-
SSDEEP
12288:8/VV8pfoM5hhZ9Uc87/onOFTkbEKSfAB1iL7OjMV72rnc80lkrqO9bYlIIAVXqWC:tfrKSjttx06DfOE1IkgJYPyTggNh
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3840 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1556 4436 rundll32.exe 86 PID 4436 wrote to memory of 1556 4436 rundll32.exe 86 PID 4436 wrote to memory of 1556 4436 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b0243f1995416121b5e7321f40f891a30082f09cd6f9d94c75a7281c60a093a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b0243f1995416121b5e7321f40f891a30082f09cd6f9d94c75a7281c60a093a.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3840
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5ac94825d5b33e35b7ba93f4b039a44ea
SHA17937a12e461bb69a03a1e69f5d51415b0c6b118f
SHA2562d448eab99860b098e963ee8c9aefd8d8bbf71d182152eb61111b2458becbad0
SHA51236d5d446379353a58eed5edce938e145133df2bbb3c47ecce077afb20e31c2904fe76bcb947feae04b06fddc4cf9128a7562b7ae09eeb72c070e5f17cb143b5d