Analysis
-
max time kernel
155s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 11:59
Behavioral task
behavioral1
Sample
35575557bd3a809a4567c1fc51848357.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
35575557bd3a809a4567c1fc51848357.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
35575557bd3a809a4567c1fc51848357.dll
-
Size
64KB
-
MD5
35575557bd3a809a4567c1fc51848357
-
SHA1
d4d2ddc7e875766d54329b8deac83ff99c57bd56
-
SHA256
7d0ed2d621158a3c9bcb8e0ff8320a757bbd76f112edf043588c38445ce25580
-
SHA512
d6d0debba3b303df633e4e0d81fdf2d5108609786e0c5965512f513c47dc321e34df2e808f12cfb780853e9a7e9ad9bd213b1854d5420e495289f1e94ee20866
-
SSDEEP
1536:RpU7X3/RNVBNLDbv3suXMFEhj/4XCDPPoqfO0oW8:A5NVzLcuXMFYj/4XmPPoJ0oW8
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4672-0-0x0000000010000000-0x000000001002E000-memory.dmp vmprotect behavioral2/memory/4672-1-0x0000000010000000-0x000000001002E000-memory.dmp vmprotect behavioral2/memory/4672-2-0x0000000010000000-0x000000001002E000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe 4672 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4672 4404 rundll32.exe 89 PID 4404 wrote to memory of 4672 4404 rundll32.exe 89 PID 4404 wrote to memory of 4672 4404 rundll32.exe 89 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1 PID 4672 wrote to memory of 688 4672 rundll32.exe 1
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35575557bd3a809a4567c1fc51848357.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35575557bd3a809a4567c1fc51848357.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672
-