Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
9c0cdaa5cdc0ee01720c5c9589111265928790a9194dc778192c3943f2645d5f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c0cdaa5cdc0ee01720c5c9589111265928790a9194dc778192c3943f2645d5f.dll
Resource
win10v2004-20231222-en
General
-
Target
9c0cdaa5cdc0ee01720c5c9589111265928790a9194dc778192c3943f2645d5f.dll
-
Size
397KB
-
MD5
2e8f538f3df65f6bfc83ac54e2a5834b
-
SHA1
6d71a9e59f736b4ae8f19e4839a8bb05b289a638
-
SHA256
9c0cdaa5cdc0ee01720c5c9589111265928790a9194dc778192c3943f2645d5f
-
SHA512
e0e0da0cc7a233ecd08f2a1aadec012b7d2750b6802944829c83840895ffd1f41af12a89c4e04aed16355d786ae09c9dd03885f621a40a00c917a948292a2ec3
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaz:174g2LDeiPDImOkx2LIaz
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1640 rundll32.exe Token: SeTcbPrivilege 1640 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1640 1932 rundll32.exe 15 PID 1932 wrote to memory of 1640 1932 rundll32.exe 15 PID 1932 wrote to memory of 1640 1932 rundll32.exe 15
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c0cdaa5cdc0ee01720c5c9589111265928790a9194dc778192c3943f2645d5f.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c0cdaa5cdc0ee01720c5c9589111265928790a9194dc778192c3943f2645d5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1932