Analysis
-
max time kernel
106s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
52c3c755780c48055217b9f6268b0f09b82152687470473a5ea5638f28e0803f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52c3c755780c48055217b9f6268b0f09b82152687470473a5ea5638f28e0803f.dll
Resource
win10v2004-20231215-en
General
-
Target
52c3c755780c48055217b9f6268b0f09b82152687470473a5ea5638f28e0803f.dll
-
Size
397KB
-
MD5
0e152f4aa0fa07c8311c59e932fd0daa
-
SHA1
d25ba971f835cd27be326aeafee18ce8f93a41b7
-
SHA256
52c3c755780c48055217b9f6268b0f09b82152687470473a5ea5638f28e0803f
-
SHA512
0b264734606f6b41d324bf9b05b97de64ff75d5df092b9b509654b45ccdb3569f0453aec73c3ab6972e6e6dc9d5a006a3f67faaec27f780dd4e1b0e674063335
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaG:174g2LDeiPDImOkx2LIaG
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2996 rundll32.exe 2996 rundll32.exe 2996 rundll32.exe 2996 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2996 rundll32.exe Token: SeTcbPrivilege 2996 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2996 2648 rundll32.exe 27 PID 2648 wrote to memory of 2996 2648 rundll32.exe 27 PID 2648 wrote to memory of 2996 2648 rundll32.exe 27 PID 2648 wrote to memory of 2996 2648 rundll32.exe 27 PID 2648 wrote to memory of 2996 2648 rundll32.exe 27 PID 2648 wrote to memory of 2996 2648 rundll32.exe 27 PID 2648 wrote to memory of 2996 2648 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52c3c755780c48055217b9f6268b0f09b82152687470473a5ea5638f28e0803f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52c3c755780c48055217b9f6268b0f09b82152687470473a5ea5638f28e0803f.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-