Analysis
-
max time kernel
126s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3774fe75c4c2523d3783250225f1a7e9.dll
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3774fe75c4c2523d3783250225f1a7e9.dll
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
3774fe75c4c2523d3783250225f1a7e9.dll
-
Size
17KB
-
MD5
3774fe75c4c2523d3783250225f1a7e9
-
SHA1
405e256b77fb7ad0341a7ba3b58fbccd96f1afaa
-
SHA256
d9ebb4f37c6268491de2faa6dc54c661c567fcb9a6204599cb15df6f896b5389
-
SHA512
220a4c1142966baea44ec1c9c647fe53fc980b67df09cd3dc28be8f8992a90425f0aa4f9524167900cd06dc94762ceaa6ae88a2398bc067e03ba669cdb307c87
-
SSDEEP
384:07816G9cjfmfFiQslw2+4E/f7tBvsPbnFw:0gh9uGFiRlR2/f7t1sPbn
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\CelInDriver.sys rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\CelInDrv\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\CelInDriver.sys" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windds32.dll rundll32.exe File created C:\Windows\SysWOW64\windds32.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1840 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1840 rundll32.exe Token: SeDebugPrivilege 1840 rundll32.exe Token: SeDebugPrivilege 1840 rundll32.exe Token: SeLoadDriverPrivilege 1840 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1840 1132 rundll32.exe 14 PID 1132 wrote to memory of 1840 1132 rundll32.exe 14 PID 1132 wrote to memory of 1840 1132 rundll32.exe 14 PID 1840 wrote to memory of 3452 1840 rundll32.exe 44
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3774fe75c4c2523d3783250225f1a7e9.dll,#11⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3774fe75c4c2523d3783250225f1a7e9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452