Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
341e1c8f3f1bd3008ae3e6bd9e9ab64787ccc2d6e8de6ff0a415aa187f841421.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
341e1c8f3f1bd3008ae3e6bd9e9ab64787ccc2d6e8de6ff0a415aa187f841421.dll
Resource
win10v2004-20231215-en
General
-
Target
341e1c8f3f1bd3008ae3e6bd9e9ab64787ccc2d6e8de6ff0a415aa187f841421.dll
-
Size
397KB
-
MD5
bc65f910a59356c66a665bf01c17b2bc
-
SHA1
3ee1ca799da8d972311ef2575c0d9469f61fe4b7
-
SHA256
341e1c8f3f1bd3008ae3e6bd9e9ab64787ccc2d6e8de6ff0a415aa187f841421
-
SHA512
730c58b5562118974f35dc24239822ac661656b5da7df9796b7e0e0eb5cf0a6c822f9f3bc548803b994e2a749c1fd4fe1eb10b3b128d98b7d6363db2ad22194c
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOap:174g2LDeiPDImOkx2LIap
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1988 rundll32.exe 1988 rundll32.exe 1988 rundll32.exe 1988 rundll32.exe 1988 rundll32.exe 1988 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1988 rundll32.exe Token: SeTcbPrivilege 1988 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1988 2256 rundll32.exe 28 PID 2256 wrote to memory of 1988 2256 rundll32.exe 28 PID 2256 wrote to memory of 1988 2256 rundll32.exe 28 PID 2256 wrote to memory of 1988 2256 rundll32.exe 28 PID 2256 wrote to memory of 1988 2256 rundll32.exe 28 PID 2256 wrote to memory of 1988 2256 rundll32.exe 28 PID 2256 wrote to memory of 1988 2256 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\341e1c8f3f1bd3008ae3e6bd9e9ab64787ccc2d6e8de6ff0a415aa187f841421.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\341e1c8f3f1bd3008ae3e6bd9e9ab64787ccc2d6e8de6ff0a415aa187f841421.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-