Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 10:05
Behavioral task
behavioral1
Sample
c316ac5c8cf6522f001a4949a3535e6d.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c316ac5c8cf6522f001a4949a3535e6d.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
c316ac5c8cf6522f001a4949a3535e6d.dll
-
Size
19KB
-
MD5
c316ac5c8cf6522f001a4949a3535e6d
-
SHA1
9d50211eb4314038587c49824b082e92ebd411dc
-
SHA256
2d1450fb97a593f085e4f7e8cd4b39dda6ee10afbd9f3ca5988491237aa971e2
-
SHA512
779ee27d21ac403e5e5fd42d53768b2dce1f90d3e20c0799809103c9b825d530b6f7ebb61b64a490848a54909457ea3a260c4d35b3ec018f80ccc9e892663a92
-
SSDEEP
384:GNp6wetX0LT9l2/QzuVRHPf7PY9HXyxS/y6ucFH+:GNp6htXYUQzuPIXEw0cFe
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2628-0-0x00000000008B0000-0x00000000008C2000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 2628 116 rundll32.exe 89 PID 116 wrote to memory of 2628 116 rundll32.exe 89 PID 116 wrote to memory of 2628 116 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c316ac5c8cf6522f001a4949a3535e6d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c316ac5c8cf6522f001a4949a3535e6d.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-