Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
6a4aea06faab2fb3298ddec4f9828f5b268117475180a6715b4d966a32386495.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a4aea06faab2fb3298ddec4f9828f5b268117475180a6715b4d966a32386495.dll
Resource
win10v2004-20231215-en
General
-
Target
6a4aea06faab2fb3298ddec4f9828f5b268117475180a6715b4d966a32386495.dll
-
Size
397KB
-
MD5
86be7badc4ce42552d3201485427c8e1
-
SHA1
ba50d477a587149da112ca59f2dc238650f5b5c8
-
SHA256
6a4aea06faab2fb3298ddec4f9828f5b268117475180a6715b4d966a32386495
-
SHA512
27b55a3ab648117e44832bf46b79909738972f52765f199231351eb119b4a742e736fa63c1b3e2437247a5efa7b6c31d6240f0c22b197a8d59df82d2d6badb84
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaQ:174g2LDeiPDImOkx2LIaQ
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 rundll32.exe Token: SeTcbPrivilege 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2720 2028 rundll32.exe 28 PID 2028 wrote to memory of 2720 2028 rundll32.exe 28 PID 2028 wrote to memory of 2720 2028 rundll32.exe 28 PID 2028 wrote to memory of 2720 2028 rundll32.exe 28 PID 2028 wrote to memory of 2720 2028 rundll32.exe 28 PID 2028 wrote to memory of 2720 2028 rundll32.exe 28 PID 2028 wrote to memory of 2720 2028 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a4aea06faab2fb3298ddec4f9828f5b268117475180a6715b4d966a32386495.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a4aea06faab2fb3298ddec4f9828f5b268117475180a6715b4d966a32386495.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-