Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a2e54d3df655e0facc47b714bca66d5.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a2e54d3df655e0facc47b714bca66d5.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4a2e54d3df655e0facc47b714bca66d5.dll
-
Size
62KB
-
MD5
4a2e54d3df655e0facc47b714bca66d5
-
SHA1
a5f3842e889d140c0f88713803502db48d00c6e1
-
SHA256
50d3f3e40c6e0ec3f2f3431888c8c83b851fdda5ee2cc0e45f32d8f3494c5112
-
SHA512
ecd515c5dacfbdfb3ed2f24a9169ec86cd683b60ab05b200555b007ea090e84c2521014124007eea66b95a6fbc6150ea4f74909ac862f343c7bca03adf2ad895
-
SSDEEP
1536:mbLphu3oYbGoRh7dV9fjTL4ohoOj/0YXfiWIj:Ipmogn9ffcoho6/XXfP
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\iuecstlcwbefhpm\imagepath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\20E9.tmp" rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1888 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1888 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1888 2024 rundll32.exe 16 PID 2024 wrote to memory of 1888 2024 rundll32.exe 16 PID 2024 wrote to memory of 1888 2024 rundll32.exe 16 PID 2024 wrote to memory of 1888 2024 rundll32.exe 16 PID 2024 wrote to memory of 1888 2024 rundll32.exe 16 PID 2024 wrote to memory of 1888 2024 rundll32.exe 16 PID 2024 wrote to memory of 1888 2024 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a2e54d3df655e0facc47b714bca66d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a2e54d3df655e0facc47b714bca66d5.dll,#12⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1888
-