Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 01:12

Errors

Reason
Machine shutdown

General

  • Target

    b62429ba7840c28866d0673689e663ff.dll

  • Size

    64KB

  • MD5

    b62429ba7840c28866d0673689e663ff

  • SHA1

    a79fb109d4f6004306efae4c4b5c3aab077cb187

  • SHA256

    c5e9216b24de59dbe54cf769319861c20c06375a0c92e35651a0ab53bf860dcf

  • SHA512

    ddd876960022158dd380d2d1ea1076842aa1589bfa94ad9917c2713437ae4dba4cc5126e2be0708133b2961b2f66093857077df0c6b879e069b8c18e83f636d8

  • SSDEEP

    768:MqiqbT1CyYDktlzeEFRi3DrALm3xTWZZhHwdHzgeVNLVVSOeEJ9y59o:Wyckl+IL8xTWZZhHw5pD8EJ09o

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b62429ba7840c28866d0673689e663ff.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b62429ba7840c28866d0673689e663ff.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4320
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3945855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:64

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads