Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
b45088b6a7dd7f375587001a9c1d4922d25d34221d50321e74a38bf51b55df8b.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b45088b6a7dd7f375587001a9c1d4922d25d34221d50321e74a38bf51b55df8b.dll
Resource
win10v2004-20231215-en
General
-
Target
b45088b6a7dd7f375587001a9c1d4922d25d34221d50321e74a38bf51b55df8b.dll
-
Size
397KB
-
MD5
d0035f842221e6c7397575f950e16996
-
SHA1
3fb65d477ae66c443ade2627148bc517067e6243
-
SHA256
b45088b6a7dd7f375587001a9c1d4922d25d34221d50321e74a38bf51b55df8b
-
SHA512
924d34dca0971ad8b3a494114329ab2a38462045fc4dbd506660abe049b36b6b9ce8d90249af554c5539f12571173c3d41a9b340d5ca19dde2d60b544e94fee6
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaZ:174g2LDeiPDImOkx2LIaZ
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2348 rundll32.exe Token: SeTcbPrivilege 2348 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2348 2328 rundll32.exe 16 PID 2328 wrote to memory of 2348 2328 rundll32.exe 16 PID 2328 wrote to memory of 2348 2328 rundll32.exe 16 PID 2328 wrote to memory of 2348 2328 rundll32.exe 16 PID 2328 wrote to memory of 2348 2328 rundll32.exe 16 PID 2328 wrote to memory of 2348 2328 rundll32.exe 16 PID 2328 wrote to memory of 2348 2328 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b45088b6a7dd7f375587001a9c1d4922d25d34221d50321e74a38bf51b55df8b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b45088b6a7dd7f375587001a9c1d4922d25d34221d50321e74a38bf51b55df8b.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-