Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-01-2024 10:30
Behavioral task
behavioral1
Sample
5fabc724f1191428b447c86a23aa3092.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5fabc724f1191428b447c86a23aa3092.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
5fabc724f1191428b447c86a23aa3092.dll
-
Size
299KB
-
MD5
5fabc724f1191428b447c86a23aa3092
-
SHA1
3857722c33cc2140225ac74884175f850c6ec295
-
SHA256
27cc74d89f7c06b84a52e0d77251d7343dc2f4708c16ae4ffcef4e41ec656dfa
-
SHA512
e4448d881bbd7112f899cc38ee7ef625b26f5ca349c9956b7f33c81a51a15f8aa917cdfd4704b7ec072acde7d4ef924897b993b7a022bdcba2fcdf34e0b6894c
-
SSDEEP
6144:rTW3YgVzMS73tzrVmSavGXQ+90sGjGms4+/NoNZra8dOJCUJ8eANlq:rTW3YmzMc3tzrVmLvGA5sGimst/NQ/Uv
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\rundll32.exe: $FILE rundll32.exe File opened for modification C:\Windows\system32\rundll32.exe: $TASK rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2668 taskeng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2124 2668 taskeng.exe 31 PID 2668 wrote to memory of 2124 2668 taskeng.exe 31 PID 2668 wrote to memory of 2124 2668 taskeng.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5fabc724f1191428b447c86a23aa3092.dll,#11⤵
- Drops file in System32 directory
PID:2156
-
C:\Windows\system32\taskeng.exetaskeng.exe {371C00A7-3B75-41FB-A457-E00C67BF001F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe -u2⤵PID:2124
-