Analysis

  • max time kernel
    1503s
  • max time network
    1552s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 15:36

General

  • Target

    x64/plugins/DotNetTools.dll

  • Size

    132KB

  • MD5

    b16ce8ba8e7f0ee83ec1d49f2d0af0a7

  • SHA1

    cdf17a7beb537853fae6214d028754ce98e2e860

  • SHA256

    b4cc0280e2caa0335361172cb7d673f745defc78299ded808426ffbc2458e4d9

  • SHA512

    32de59c95d1690f4221b236376e282c8be1bb7f5d567592b935dcd798b36b80e86da81741c5845fa280386f75f6eafc9bbd41035362984150b134d24aede61eb

  • SSDEEP

    3072:OkF+ncOyiGt9KQ130WlLJydacG3EkLLFjSeB:Oi+WH130U/

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\x64\plugins\DotNetTools.dll,#1
    1⤵
      PID:1812
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:3564
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3752

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3752-0-0x0000022FCBB40000-0x0000022FCBB50000-memory.dmp

        Filesize

        64KB

      • memory/3752-16-0x0000022FCBC40000-0x0000022FCBC50000-memory.dmp

        Filesize

        64KB

      • memory/3752-32-0x0000022FD41F0000-0x0000022FD41F1000-memory.dmp

        Filesize

        4KB

      • memory/3752-33-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-34-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-35-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-36-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-37-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-38-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-39-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-40-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-41-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-42-0x0000022FD4210000-0x0000022FD4211000-memory.dmp

        Filesize

        4KB

      • memory/3752-43-0x0000022FD3E40000-0x0000022FD3E41000-memory.dmp

        Filesize

        4KB

      • memory/3752-44-0x0000022FD3E30000-0x0000022FD3E31000-memory.dmp

        Filesize

        4KB

      • memory/3752-46-0x0000022FD3E40000-0x0000022FD3E41000-memory.dmp

        Filesize

        4KB

      • memory/3752-49-0x0000022FD3E30000-0x0000022FD3E31000-memory.dmp

        Filesize

        4KB

      • memory/3752-52-0x0000022FD3D70000-0x0000022FD3D71000-memory.dmp

        Filesize

        4KB

      • memory/3752-64-0x0000022FD3F70000-0x0000022FD3F71000-memory.dmp

        Filesize

        4KB

      • memory/3752-66-0x0000022FD3F80000-0x0000022FD3F81000-memory.dmp

        Filesize

        4KB

      • memory/3752-67-0x0000022FD3F80000-0x0000022FD3F81000-memory.dmp

        Filesize

        4KB

      • memory/3752-68-0x0000022FD4090000-0x0000022FD4091000-memory.dmp

        Filesize

        4KB