Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2023 06:45
Static task
static1
1 signatures
General
-
Target
5e12c313a6acc3324af1a3e8edf060338b3e8432e031e4fda7d3787b5119683f.dll
-
Size
1.6MB
-
MD5
7692f2a72e44e0784d2efcc0bc14428d
-
SHA1
a45d24c73f7d24c256f811d180d58ad7471a7faa
-
SHA256
5e12c313a6acc3324af1a3e8edf060338b3e8432e031e4fda7d3787b5119683f
-
SHA512
a6181b8668606ec1571ac01052ce09456f884aeefabca85f850366a68550a810e5a3a39943cb79bf0e85fe63d2a125afaad2fb6a1bf33ffadd354b3537c7eff3
-
SSDEEP
24576:JeC6d4Qm5o9dF1rT/ygBLOiaucihUZ5tU80IYabEnNSeyPUFrPmnrw13QiGGAK8Z:IvZ9djrT/HLlvIYabSymLyQYGAHgO
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3076 set thread context of 560 3076 rundll32.exe SearchProtocolHost.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 448 ipconfig.exe 2452 netstat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SearchProtocolHost.exepid process 560 SearchProtocolHost.exe 560 SearchProtocolHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
rundll32.exepid process 3076 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 1076 whoami.exe Token: SeDebugPrivilege 2452 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.execmd.exerundll32.exerundll32.exedescription pid process target process PID 3296 wrote to memory of 4464 3296 rundll32.exe rundll32.exe PID 3296 wrote to memory of 4464 3296 rundll32.exe rundll32.exe PID 3296 wrote to memory of 4464 3296 rundll32.exe rundll32.exe PID 4396 wrote to memory of 2496 4396 cmd.exe rundll32.exe PID 4396 wrote to memory of 2496 4396 cmd.exe rundll32.exe PID 2496 wrote to memory of 3076 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 3076 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 3076 2496 rundll32.exe rundll32.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe PID 3076 wrote to memory of 560 3076 rundll32.exe SearchProtocolHost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e12c313a6acc3324af1a3e8edf060338b3e8432e031e4fda7d3787b5119683f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e12c313a6acc3324af1a3e8edf060338b3e8432e031e4fda7d3787b5119683f.dll,#12⤵PID:4464
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3860
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\rundll32.exerundll32.exe 5e12c313a6acc3324af1a3e8edf060338b3e8432e031e4fda7d3787b5119683f.dll Throw2⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe 5e12c313a6acc3324af1a3e8edf060338b3e8432e031e4fda7d3787b5119683f.dll Throw3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all5⤵
- Gathers network information
PID:448
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
-