Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
a00880512df8cb860621a5f575b51c23e7dc5997352e36fdacc8319a55d2b93c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a00880512df8cb860621a5f575b51c23e7dc5997352e36fdacc8319a55d2b93c.dll
Resource
win10v2004-20231215-en
General
-
Target
a00880512df8cb860621a5f575b51c23e7dc5997352e36fdacc8319a55d2b93c.dll
-
Size
397KB
-
MD5
c564907f754be872c64ddb88f6ab9d96
-
SHA1
3546a74a2f5ad6bf1ede8f51fea4f4034e24a94f
-
SHA256
a00880512df8cb860621a5f575b51c23e7dc5997352e36fdacc8319a55d2b93c
-
SHA512
4f8f3d796831192c46f860c56e209a2cf9b7413af4efb724c63944ed0e20e416dd83c788a0264fb5ff09cb98710718672662301b8cfe63da30305d3d60cbda70
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOab:174g2LDeiPDImOkx2LIab
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2392 rundll32.exe Token: SeTcbPrivilege 2392 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a00880512df8cb860621a5f575b51c23e7dc5997352e36fdacc8319a55d2b93c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a00880512df8cb860621a5f575b51c23e7dc5997352e36fdacc8319a55d2b93c.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-