Analysis
-
max time kernel
396s -
max time network
366s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 23:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4af18b2314609db33db030b963aa1d9a43cbb627472ed8f9235ef476236ad7b6.dll
Resource
win7-20231215-en
4 signatures
600 seconds
General
-
Target
4af18b2314609db33db030b963aa1d9a43cbb627472ed8f9235ef476236ad7b6.dll
-
Size
164KB
-
MD5
624db864fe644bc08c16cdbdb8f4bdfb
-
SHA1
13ce6a79cc7ca92c5c1cfe6f8d1e44a904605de1
-
SHA256
4af18b2314609db33db030b963aa1d9a43cbb627472ed8f9235ef476236ad7b6
-
SHA512
28158e96d7c3baf93c31bea2f08b8d542c67e6b53239ffad37d63ffb4a53cea6379c122f7f0418412c19e6f96d8eafcc02c9f3feca5d87229958b35052cdf472
-
SSDEEP
3072:18IeuMsXSFTisGNg3vUmCTBfuWVZtxFJ1l9t1ltNtNQa3l7qF3Lr7j9hlOxAzkNF:18VuMsCFTiX0vDCTBI3L75tEWfmv+Q
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\spliter.sys rundll32.exe File created C:\Windows\system32\drivers\spliter.sys rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\spliter\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\spliter.sys" rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 2000 rundll32.exe 2000 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2000 rundll32.exe Token: SeShutdownPrivilege 2000 rundll32.exe Token: SeLoadDriverPrivilege 2000 rundll32.exe Token: SeDebugPrivilege 2000 rundll32.exe Token: SeShutdownPrivilege 2000 rundll32.exe Token: SeLoadDriverPrivilege 2000 rundll32.exe Token: 33 1416 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1416 AUDIODG.EXE Token: 33 1416 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1416 AUDIODG.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4af18b2314609db33db030b963aa1d9a43cbb627472ed8f9235ef476236ad7b6.dll,#11⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:1112
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:808
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5741⤵
- Suspicious use of AdjustPrivilegeToken
PID:1416