Analysis
-
max time kernel
147s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
cd4ec01f004f7065ae411fa864b28ba5ba235fa5a1668a1d4eb0b3dc3a794e7d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cd4ec01f004f7065ae411fa864b28ba5ba235fa5a1668a1d4eb0b3dc3a794e7d.dll
Resource
win10v2004-20231222-en
General
-
Target
cd4ec01f004f7065ae411fa864b28ba5ba235fa5a1668a1d4eb0b3dc3a794e7d.dll
-
Size
397KB
-
MD5
45ed0ca2ee4ba89a6d41ece3122dcf29
-
SHA1
3b8806712fc32d8cd634fc825832bc6ac7391355
-
SHA256
cd4ec01f004f7065ae411fa864b28ba5ba235fa5a1668a1d4eb0b3dc3a794e7d
-
SHA512
0c6c598c07ba2646c389020371911b179e76e0b39d8bbb93fdc47e28de4040f2a3d519bc19bfcb280dc5361815ab310777268ac295e8c48ba4730d8981164332
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaB:174g2LDeiPDImOkx2LIaB
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 116 rundll32.exe Token: SeTcbPrivilege 116 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 116 4028 rundll32.exe 14 PID 4028 wrote to memory of 116 4028 rundll32.exe 14 PID 4028 wrote to memory of 116 4028 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd4ec01f004f7065ae411fa864b28ba5ba235fa5a1668a1d4eb0b3dc3a794e7d.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd4ec01f004f7065ae411fa864b28ba5ba235fa5a1668a1d4eb0b3dc3a794e7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4028