Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07a277fcdaf4e1dfe8d1a5f64fef965e.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
07a277fcdaf4e1dfe8d1a5f64fef965e.dll
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
07a277fcdaf4e1dfe8d1a5f64fef965e.dll
-
Size
9KB
-
MD5
07a277fcdaf4e1dfe8d1a5f64fef965e
-
SHA1
597f3d783520594545ee2a27b467a679c0345c8c
-
SHA256
375cb05c41553eb380ca0af7fe6be01f27a17adf2809ceda34e6733992fff2da
-
SHA512
2a4aa220cebb948aa005c9431fd4e7d15a65a0f565366fc2878e5452ccec7e2740ed3b20e93968979fd70775637d5dd4f06fac0e8c9cd5897f930847284b9ae8
-
SSDEEP
192:iSX86QpAx+Zn9bc9cTDoe2oAQpDrTzt7lsRc4WLW0FVfMcgokgUw9Qx:Ps6Nwrc98vAkDjt7WWLnVLAf
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 792 rundll32.exe 792 rundll32.exe 792 rundll32.exe 792 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 792 1508 rundll32.exe 14 PID 1508 wrote to memory of 792 1508 rundll32.exe 14 PID 1508 wrote to memory of 792 1508 rundll32.exe 14 PID 792 wrote to memory of 3528 792 rundll32.exe 48
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a277fcdaf4e1dfe8d1a5f64fef965e.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a277fcdaf4e1dfe8d1a5f64fef965e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528