Analysis
-
max time kernel
576s -
max time network
1146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
Custom.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Custom.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20231222-en
General
-
Target
Custom.dll
-
Size
3.6MB
-
MD5
28c87bb3b0a5ca2c9808e83993c3da03
-
SHA1
babdb64f468b6893b7798a166d484f1926ec599a
-
SHA256
c53e2fe707e0a58286c0ca7e15988c7e07a5c6609744465d5099131d115d4a3d
-
SHA512
106dfbded22dae2f0d10655ae555e9e7fbe5f5aa28f38a01879ee898dba3e7f7ccd5658d8670f5b1f922e3cd2a2a90d6d9c557f95da239ceb7b4cfe65508999c
-
SSDEEP
98304:5tqYopU5sN4sxMFCh2+cGjeQTBTb6rJBy7ZA9p:5tqYopzeS1hF56rJBy7O
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1756 svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Custom.dll,#11⤵PID:4992
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2024
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756