Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 07:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64d94bce7281dfe6fb97939c6651fce3.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
64d94bce7281dfe6fb97939c6651fce3.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
64d94bce7281dfe6fb97939c6651fce3.dll
-
Size
300KB
-
MD5
64d94bce7281dfe6fb97939c6651fce3
-
SHA1
515db6800d549a709d38968504f8850d164993fd
-
SHA256
04edb707b27632711b78f98fe66b3f9a78de04624e4f65e551035c0a193dbc3d
-
SHA512
88df482565d31f94bae29565f969db6f0f21ee8352c573bef26b227352785b0de17a9e78ada30b303ee85db37c9fb7e3a5267a1c46264c411f07d1705d80caa9
-
SSDEEP
6144:uA2iBzok8ag9cMDXexovX+Wo22HbbfTcnmWG0EM8ZCzERln:uAHGk8T9cMDXexoPdovHbbfomWG0usw9
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\gmjgty.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\gmjgty.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe 376 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 376 rundll32.exe Token: SeDebugPrivilege 376 rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1404 wrote to memory of 376 1404 rundll32.exe 84 PID 1404 wrote to memory of 376 1404 rundll32.exe 84 PID 1404 wrote to memory of 376 1404 rundll32.exe 84 PID 376 wrote to memory of 3384 376 rundll32.exe 43 PID 376 wrote to memory of 3384 376 rundll32.exe 43
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3384
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d94bce7281dfe6fb97939c6651fce3.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d94bce7281dfe6fb97939c6651fce3.dll,#13⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:376
-
-