Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 14:04

General

  • Target

    e1d773bb6829a59983add2e7a57e9414.dll

  • Size

    137KB

  • MD5

    e1d773bb6829a59983add2e7a57e9414

  • SHA1

    6a694d57a14d7324154af132832d0d8fcec77ce2

  • SHA256

    65be47556ba0b5f1193292ebdef1be6b351d1cab723c7155de0d0c3d856ec394

  • SHA512

    7f669427317dab39fc4096e738727dc9e162dd2f44fc2cf5106d27f5fbbae6f7a6e4e4cbbd9982ed7186453eea1b33a9468c1a014ca5142724d841d12c90813c

  • SSDEEP

    3072:LCOccKU7Q/VdWkQD+wDScG2cznwrMrNtZWTvQZf6l:1mVA+fcPxSAifw

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d773bb6829a59983add2e7a57e9414.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d773bb6829a59983add2e7a57e9414.dll,#1
      2⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads