Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
45dba12933f5b2287fc0ea8a53bdbbfbb62b80e78507f42d98968b9adf52b227.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
45dba12933f5b2287fc0ea8a53bdbbfbb62b80e78507f42d98968b9adf52b227.dll
Resource
win10v2004-20240412-en
General
-
Target
45dba12933f5b2287fc0ea8a53bdbbfbb62b80e78507f42d98968b9adf52b227.dll
-
Size
397KB
-
MD5
fd37d5ea147c37bfe6a72572d9e12cd7
-
SHA1
f8e5b93d79abf4ff197a2542935ed0a50789fcab
-
SHA256
45dba12933f5b2287fc0ea8a53bdbbfbb62b80e78507f42d98968b9adf52b227
-
SHA512
43ca36ff3bf9e5d5fb7ddbb9422f416b6eaa98d78dff1a189b7d563a475efc46cdf8509cf9b84f481a989e592dd17e4fb4595cf486c7cd911470539a484c7ba0
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOa/:174g2LDeiPDImOkx2LIa/
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1112 rundll32.exe 1112 rundll32.exe 1112 rundll32.exe 1112 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1112 rundll32.exe Token: SeTcbPrivilege 1112 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1112 2192 rundll32.exe 28 PID 2192 wrote to memory of 1112 2192 rundll32.exe 28 PID 2192 wrote to memory of 1112 2192 rundll32.exe 28 PID 2192 wrote to memory of 1112 2192 rundll32.exe 28 PID 2192 wrote to memory of 1112 2192 rundll32.exe 28 PID 2192 wrote to memory of 1112 2192 rundll32.exe 28 PID 2192 wrote to memory of 1112 2192 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45dba12933f5b2287fc0ea8a53bdbbfbb62b80e78507f42d98968b9adf52b227.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45dba12933f5b2287fc0ea8a53bdbbfbb62b80e78507f42d98968b9adf52b227.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-