Analysis
-
max time kernel
143s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
a67cd5a802b1613e6ee26f6ae1df725f987af9b655495360ffb55ec13abf70f0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a67cd5a802b1613e6ee26f6ae1df725f987af9b655495360ffb55ec13abf70f0.dll
Resource
win10v2004-20231222-en
General
-
Target
a67cd5a802b1613e6ee26f6ae1df725f987af9b655495360ffb55ec13abf70f0.dll
-
Size
397KB
-
MD5
dda52ba921952ae7d83f78c1837181c2
-
SHA1
82487fb7f810c4158919c8b5deb9c2896adb56a2
-
SHA256
a67cd5a802b1613e6ee26f6ae1df725f987af9b655495360ffb55ec13abf70f0
-
SHA512
c94fb23590b8ffc8d987595752fc7676b4d9fa132751cdf547c8862b84460ffd3e3471678a16e36a9baede5e921c3f8125d9f6486c80c36f2c1bcb2f81a80c9e
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOan:174g2LDeiPDImOkx2LIan
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3572 rundll32.exe 3572 rundll32.exe 3572 rundll32.exe 3572 rundll32.exe 3572 rundll32.exe 3572 rundll32.exe 3572 rundll32.exe 3572 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3572 rundll32.exe Token: SeTcbPrivilege 3572 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3572 2716 rundll32.exe 14 PID 2716 wrote to memory of 3572 2716 rundll32.exe 14 PID 2716 wrote to memory of 3572 2716 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a67cd5a802b1613e6ee26f6ae1df725f987af9b655495360ffb55ec13abf70f0.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a67cd5a802b1613e6ee26f6ae1df725f987af9b655495360ffb55ec13abf70f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2716