Analysis
-
max time kernel
153s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2b34f8ec877c77b9e7a0f939945141b0.dll
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b34f8ec877c77b9e7a0f939945141b0.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2b34f8ec877c77b9e7a0f939945141b0.dll
-
Size
11KB
-
MD5
2b34f8ec877c77b9e7a0f939945141b0
-
SHA1
8aef0421912eab250d54d1a50a8d19bbbe1c33cf
-
SHA256
5cfb9025691d1fdca47f5e95b54841d985f8df0681367bf6ce59e13a0a416937
-
SHA512
84ed1a9b00692238537e8777333099f63636bf9b8b96e0166e2a2b48cff328fab452e1433c4b54054b0e9b0da8d14b72c6d3ee8bc21e1707ee42dd57428062d9
-
SSDEEP
192:exqn5lKIVYh8HSX000iNVXGcGAXhWICOOnZ22gQWCE2S+qQAkgUw9E:75lLYCHo0iNVJPFpOZWQ7qWn
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 412 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 412 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 412 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 412 4920 rundll32.exe 57 PID 4920 wrote to memory of 412 4920 rundll32.exe 57 PID 4920 wrote to memory of 412 4920 rundll32.exe 57
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b34f8ec877c77b9e7a0f939945141b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b34f8ec877c77b9e7a0f939945141b0.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:412
-