Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2023 18:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eef3847e6072e3816f9d1e65bd0622e69a8ff94041afff760341dd380b3652fd.dll
Resource
win7-20231020-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
eef3847e6072e3816f9d1e65bd0622e69a8ff94041afff760341dd380b3652fd.dll
Resource
win10v2004-20231025-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
eef3847e6072e3816f9d1e65bd0622e69a8ff94041afff760341dd380b3652fd.dll
-
Size
88KB
-
MD5
6638786b04f039b0dd1c0fb3206a7679
-
SHA1
acfdb7c4e6b2b8ee217d8461088c9276dcfb4e8b
-
SHA256
eef3847e6072e3816f9d1e65bd0622e69a8ff94041afff760341dd380b3652fd
-
SHA512
b7b24100235d2850b9a83b63988901e0ea77ed9a79817e625bab1ded158a017f14278b1b93596398e6bb90f32f20c2134e9057e4e57757767623919fb2fabbd5
-
SSDEEP
1536:xxZG1FgMlHz1TVPp8qSTedYYbAKs6aYt3:xrGkOPP/HxI6aYt
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 8 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2180 4644 rundll32.exe 86 PID 4644 wrote to memory of 2180 4644 rundll32.exe 86 PID 4644 wrote to memory of 2180 4644 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eef3847e6072e3816f9d1e65bd0622e69a8ff94041afff760341dd380b3652fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eef3847e6072e3816f9d1e65bd0622e69a8ff94041afff760341dd380b3652fd.dll,#12⤵PID:2180
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:8