Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
23614eced1863ad718fd55c78599d311c4ebfe2c60c56c5ce4469718e2e71c73.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
23614eced1863ad718fd55c78599d311c4ebfe2c60c56c5ce4469718e2e71c73.dll
Resource
win10v2004-20231023-en
General
-
Target
23614eced1863ad718fd55c78599d311c4ebfe2c60c56c5ce4469718e2e71c73.dll
-
Size
3.4MB
-
MD5
b9aaa5a43c8a63deeaeb07bb0c8e2ea3
-
SHA1
efefd62c327745e683521cce46cd0b572d27e312
-
SHA256
23614eced1863ad718fd55c78599d311c4ebfe2c60c56c5ce4469718e2e71c73
-
SHA512
23549e2e1b423e69337a0901f97184224ca9749f6e3f8a4f34e3f88a7d7461cc0999848fbba8c7d77b602a99d5837eec879b2cf0f017a1a9c466f5042fe2347d
-
SSDEEP
49152:iXPwh11sXIAyT9tN935s5SkP2lS1mdM03aT1PLzb:qPs1sByTS5SQrWM03o1Xb
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 32 4504 rundll32.exe 35 4504 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WindowSystemNewUpdate80.log rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4504 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3872 wrote to memory of 4504 3872 rundll32.exe 89 PID 3872 wrote to memory of 4504 3872 rundll32.exe 89 PID 3872 wrote to memory of 4504 3872 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23614eced1863ad718fd55c78599d311c4ebfe2c60c56c5ce4469718e2e71c73.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23614eced1863ad718fd55c78599d311c4ebfe2c60c56c5ce4469718e2e71c73.dll,#12⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4504
-