Analysis

  • max time kernel
    1624s
  • max time network
    1168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 19:16

General

  • Target

    jre/bin/awt.dll

  • Size

    1.1MB

  • MD5

    159ccf1200c422ced5407fed35f7e37d

  • SHA1

    177a216b71c9902e254c0a9908fcb46e8d5801a9

  • SHA256

    30eb581c99c8bcbc54012aa5e6084b6ef4fcee5d9968e9cc51f5734449e1ff49

  • SHA512

    ab3f4e3851313391b5b8055e4d526963c38c4403fa74fb70750cc6a2d5108e63a0e600978fa14a7201c48e1afd718a1c6823d091c90d77b17562b7a4c8c40365

  • SSDEEP

    24576:68M4H6ioDs5FELnSbY6Ck2IlAnVCXQlFg3:9eaGnkXQlFQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\awt.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\awt.dll,#1
      2⤵
        PID:1592
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:2132
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4644

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4644-0-0x000001B699740000-0x000001B699750000-memory.dmp

        Filesize

        64KB

      • memory/4644-16-0x000001B699840000-0x000001B699850000-memory.dmp

        Filesize

        64KB

      • memory/4644-32-0x000001B6A1BB0000-0x000001B6A1BB1000-memory.dmp

        Filesize

        4KB

      • memory/4644-34-0x000001B6A1BE0000-0x000001B6A1BE1000-memory.dmp

        Filesize

        4KB

      • memory/4644-35-0x000001B6A1BE0000-0x000001B6A1BE1000-memory.dmp

        Filesize

        4KB

      • memory/4644-36-0x000001B6A1CF0000-0x000001B6A1CF1000-memory.dmp

        Filesize

        4KB