Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
3ab3e9278c7e3e68648b2cd9fa6cf9ea6df87237a585a2c0fbadab679359303c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ab3e9278c7e3e68648b2cd9fa6cf9ea6df87237a585a2c0fbadab679359303c.dll
Resource
win10v2004-20240412-en
General
-
Target
3ab3e9278c7e3e68648b2cd9fa6cf9ea6df87237a585a2c0fbadab679359303c.dll
-
Size
397KB
-
MD5
3d4f11c62794852f163e0f4252e3ca2b
-
SHA1
d86a1628cf0e90b452dc5c2b641aa93d2b46db8c
-
SHA256
3ab3e9278c7e3e68648b2cd9fa6cf9ea6df87237a585a2c0fbadab679359303c
-
SHA512
1ddcfec73d65f290c6a178e6c92dc66b907923b36d98b5c2012da2a0d00990ee0fb1b1b34be09e0f83f80177de26d6a0623a80725ad6db4766fdb754b66623bd
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOab:174g2LDeiPDImOkx2LIab
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1880 rundll32.exe 1880 rundll32.exe 1880 rundll32.exe 1880 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1880 rundll32.exe Token: SeTcbPrivilege 1880 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1880 2224 rundll32.exe 28 PID 2224 wrote to memory of 1880 2224 rundll32.exe 28 PID 2224 wrote to memory of 1880 2224 rundll32.exe 28 PID 2224 wrote to memory of 1880 2224 rundll32.exe 28 PID 2224 wrote to memory of 1880 2224 rundll32.exe 28 PID 2224 wrote to memory of 1880 2224 rundll32.exe 28 PID 2224 wrote to memory of 1880 2224 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ab3e9278c7e3e68648b2cd9fa6cf9ea6df87237a585a2c0fbadab679359303c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ab3e9278c7e3e68648b2cd9fa6cf9ea6df87237a585a2c0fbadab679359303c.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-