Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
131309990d0319b1073c923a5bb9f98d.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
131309990d0319b1073c923a5bb9f98d.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
131309990d0319b1073c923a5bb9f98d.dll
-
Size
12KB
-
MD5
131309990d0319b1073c923a5bb9f98d
-
SHA1
75535a39bf7fb22a0f9f67aed3c4136a69a4c397
-
SHA256
5e8b0bde7277c7e3ce8760c332f1c16e7f0002af9663f98d7b1cf3349ddf8a39
-
SHA512
4a4229b374022fb11467cf1fa0e7168102a8c26ab951d5e0586bb274733c49a58f428417304671040fe925cc703a1a809b2286431f28b71b96ee232a0516395b
-
SSDEEP
384:3UgMxfnlaABMXeOejLs1uPvHpw362jKM+:3XMvaAY9ys1unSXq
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4084 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4084 3700 rundll32.exe 17 PID 3700 wrote to memory of 4084 3700 rundll32.exe 17 PID 3700 wrote to memory of 4084 3700 rundll32.exe 17 PID 4084 wrote to memory of 3516 4084 rundll32.exe 44
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\131309990d0319b1073c923a5bb9f98d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\131309990d0319b1073c923a5bb9f98d.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3516