Analysis
-
max time kernel
139s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 04:37
Behavioral task
behavioral1
Sample
ca814269c8bdda5ca88ffaa981ac1d75.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ca814269c8bdda5ca88ffaa981ac1d75.dll
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
ca814269c8bdda5ca88ffaa981ac1d75.dll
-
Size
10.0MB
-
MD5
ca814269c8bdda5ca88ffaa981ac1d75
-
SHA1
2840b8ae4d07578923956d118e8214597fc04b82
-
SHA256
0006e7fa1c3d3a72815620ffb9a9766ae74b77f610777213338ede1c47cf35f3
-
SHA512
209cdce06c1ce72b243a5f55a0dda843bcd9a271d44708a0d1fb6afc5f142c7fc794d0c1d3ac19955b442ae1bb76aa9788ce85ec2e15f19e006a9393976171ae
-
SSDEEP
6144:OKcvMjX7dDzkX3kpUPKfcXjcjOZnMqYmfCPAHlJqwS4Apo8MTStEpycYP:OKTrdDzi3kpSsczpCb
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3920-0-0x0000000000570000-0x00000000005F8000-memory.dmp vmprotect behavioral2/memory/3920-1-0x0000000000570000-0x00000000005F8000-memory.dmp vmprotect -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3920 2216 rundll32.exe 98 PID 2216 wrote to memory of 3920 2216 rundll32.exe 98 PID 2216 wrote to memory of 3920 2216 rundll32.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca814269c8bdda5ca88ffaa981ac1d75.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca814269c8bdda5ca88ffaa981ac1d75.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4168 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:3980