Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 04:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
765716198b5752bb31bdddef5c99b1c4.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
765716198b5752bb31bdddef5c99b1c4.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
765716198b5752bb31bdddef5c99b1c4.dll
-
Size
8KB
-
MD5
765716198b5752bb31bdddef5c99b1c4
-
SHA1
1bf5f82885cc4d5273c50efcb245edca89eec18c
-
SHA256
cebb82df1b1f2f72ef2f58995dc118bb1ea223da1fcf039db6ad2fbcc4218bcb
-
SHA512
df985c7e523137cb37f95d9fc504284b5ed43b3226a7144107bdabf65bfd4dc00a106ec4961185c75e79668e954605028cd1df200e92413c440e6d53e633eca9
-
SSDEEP
192:8wjmxwcvsvPtxFF7iBaGy72TyFc7eCbkgUw9h:Xqxrv2VF7ra1SF2
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4296 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3560 wrote to memory of 4296 3560 rundll32.exe 85 PID 3560 wrote to memory of 4296 3560 rundll32.exe 85 PID 3560 wrote to memory of 4296 3560 rundll32.exe 85 PID 4296 wrote to memory of 3328 4296 rundll32.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3328
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\765716198b5752bb31bdddef5c99b1c4.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\765716198b5752bb31bdddef5c99b1c4.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296
-
-