Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-01-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
851b4051a845df258cb0be2f1519c65d7d360b432be546ca7360f4f349d242e0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
851b4051a845df258cb0be2f1519c65d7d360b432be546ca7360f4f349d242e0.dll
Resource
win10v2004-20231215-en
General
-
Target
851b4051a845df258cb0be2f1519c65d7d360b432be546ca7360f4f349d242e0.dll
-
Size
397KB
-
MD5
d92a0333e8287ddc49f25e5fd086b0b7
-
SHA1
5c2ea04decbf00f627a1f6d91309d9c16749a9c5
-
SHA256
851b4051a845df258cb0be2f1519c65d7d360b432be546ca7360f4f349d242e0
-
SHA512
a69da0887cd5f19046231fc192c2dc4c19c207474e89141845045db10f64c03c624fa430db80ba8688f6aaf2e7b66791597c929edd832445362fa0bf01244d87
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOa5:174g2LDeiPDImOkx2LIa5
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2172 rundll32.exe Token: SeTcbPrivilege 2172 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2172 2296 rundll32.exe 14 PID 2296 wrote to memory of 2172 2296 rundll32.exe 14 PID 2296 wrote to memory of 2172 2296 rundll32.exe 14 PID 2296 wrote to memory of 2172 2296 rundll32.exe 14 PID 2296 wrote to memory of 2172 2296 rundll32.exe 14 PID 2296 wrote to memory of 2172 2296 rundll32.exe 14 PID 2296 wrote to memory of 2172 2296 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\851b4051a845df258cb0be2f1519c65d7d360b432be546ca7360f4f349d242e0.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\851b4051a845df258cb0be2f1519c65d7d360b432be546ca7360f4f349d242e0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2296