Analysis

  • max time kernel
    1474s
  • max time network
    1523s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 15:36

General

  • Target

    x64/plugins/OnlineChecks.dll

  • Size

    222KB

  • MD5

    12c25fb356e51c3fd81d2d422a66be89

  • SHA1

    7cc763f8dc889a4ec463aaba38f6e6f65dbdbb8c

  • SHA256

    7336d66588bbcfea63351a2eb7c8d83bbd49b5d959ba56a94b1fe2e905a5b5de

  • SHA512

    927d785d03c1ee44b5e784b35a09168978b652f37fb73a1a2eeecd3583c28595fb030e8c1f87ab9a20beac4622775777820d1a2ad7219ba8b9ae8b6fbc4568a0

  • SSDEEP

    3072:VDy7cjwTlCAlW0InMxf08ZyIjSNVnKJ3HzuoX7o+ThTPD0r7NF4jM9Td2xOdj+C9:Vu71TtInMxf08gI2HnKJDuG73JtxE

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\x64\plugins\OnlineChecks.dll,#1
    1⤵
      PID:3164
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:928
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5100

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5100-0-0x0000018848F40000-0x0000018848F50000-memory.dmp

        Filesize

        64KB

      • memory/5100-16-0x0000018849040000-0x0000018849050000-memory.dmp

        Filesize

        64KB

      • memory/5100-32-0x00000188515F0000-0x00000188515F1000-memory.dmp

        Filesize

        4KB

      • memory/5100-33-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-34-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-36-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-35-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-37-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-38-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-39-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-40-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-41-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-42-0x0000018851620000-0x0000018851621000-memory.dmp

        Filesize

        4KB

      • memory/5100-44-0x0000018851230000-0x0000018851231000-memory.dmp

        Filesize

        4KB

      • memory/5100-43-0x0000018851240000-0x0000018851241000-memory.dmp

        Filesize

        4KB

      • memory/5100-46-0x0000018851240000-0x0000018851241000-memory.dmp

        Filesize

        4KB

      • memory/5100-49-0x0000018851230000-0x0000018851231000-memory.dmp

        Filesize

        4KB

      • memory/5100-52-0x0000018851170000-0x0000018851171000-memory.dmp

        Filesize

        4KB

      • memory/5100-64-0x0000018851370000-0x0000018851371000-memory.dmp

        Filesize

        4KB

      • memory/5100-66-0x0000018851380000-0x0000018851381000-memory.dmp

        Filesize

        4KB

      • memory/5100-67-0x0000018851380000-0x0000018851381000-memory.dmp

        Filesize

        4KB

      • memory/5100-68-0x0000018851490000-0x0000018851491000-memory.dmp

        Filesize

        4KB