Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:22
Behavioral task
behavioral1
Sample
1a7705af7daaf0b9f96bf64d9c94b134.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a7705af7daaf0b9f96bf64d9c94b134.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1a7705af7daaf0b9f96bf64d9c94b134.dll
-
Size
448KB
-
MD5
1a7705af7daaf0b9f96bf64d9c94b134
-
SHA1
54480404f46b5079bc7aa1e4821e6502b3c63442
-
SHA256
9f8eb4ee47a72b35aebd9ce72d0b125485c1b015bc68b63a44035b138337c244
-
SHA512
af777c898ccadcc8b8902655799eebe75a59dca4ae2d9d5ced207a1d490effc22a63c672fd10775dc80e3764c5c5a3aa11d0ebcdb15baf7ec4b02ee0f4aef890
-
SSDEEP
12288:qDz0kmLQqbkmV4Pc1sVaWelfOiX3ylTgGT:aeFbkmVnsVaZWiX3O
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1708 4880 WerFault.exe 88 -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4880 rundll32.exe Token: SeSecurityPrivilege 4880 rundll32.exe Token: SeTakeOwnershipPrivilege 4880 rundll32.exe Token: SeLoadDriverPrivilege 4880 rundll32.exe Token: SeSystemProfilePrivilege 4880 rundll32.exe Token: SeSystemtimePrivilege 4880 rundll32.exe Token: SeProfSingleProcessPrivilege 4880 rundll32.exe Token: SeIncBasePriorityPrivilege 4880 rundll32.exe Token: SeCreatePagefilePrivilege 4880 rundll32.exe Token: SeShutdownPrivilege 4880 rundll32.exe Token: SeDebugPrivilege 4880 rundll32.exe Token: SeSystemEnvironmentPrivilege 4880 rundll32.exe Token: SeRemoteShutdownPrivilege 4880 rundll32.exe Token: SeUndockPrivilege 4880 rundll32.exe Token: SeManageVolumePrivilege 4880 rundll32.exe Token: 33 4880 rundll32.exe Token: 34 4880 rundll32.exe Token: 35 4880 rundll32.exe Token: 36 4880 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3464 wrote to memory of 4880 3464 rundll32.exe 88 PID 3464 wrote to memory of 4880 3464 rundll32.exe 88 PID 3464 wrote to memory of 4880 3464 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a7705af7daaf0b9f96bf64d9c94b134.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a7705af7daaf0b9f96bf64d9c94b134.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 6363⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4880 -ip 48801⤵PID:892