Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 04:16
Behavioral task
behavioral1
Sample
efdbeee44e46fb2c0c5d09b2fb4aa4629433ed8661006ad20c337dd6ec161540.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
efdbeee44e46fb2c0c5d09b2fb4aa4629433ed8661006ad20c337dd6ec161540.dll
Resource
win10v2004-20240508-en
General
-
Target
efdbeee44e46fb2c0c5d09b2fb4aa4629433ed8661006ad20c337dd6ec161540.dll
-
Size
76KB
-
MD5
6b71a3d12d200e87a7ec64e9bfabb33f
-
SHA1
99ec1c0efcd2c50419487ea517dae71e800434da
-
SHA256
efdbeee44e46fb2c0c5d09b2fb4aa4629433ed8661006ad20c337dd6ec161540
-
SHA512
1334bd3a8e21bf49c3499ce9c284738d6ebc5317c09961ff8e0288ab7c8a54f1d659da5c1efa2a497a541ba2f90baccb63dfac280bab5f3acb91580ab5da4cd6
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZxyqBSBIBaXAX:c8y93KQjy7G55riF1cMo03HDgisXAX
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral1/memory/2200-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2200-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2200-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 804 2200 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2356 wrote to memory of 2200 2356 rundll32.exe 28 PID 2200 wrote to memory of 804 2200 rundll32.exe 29 PID 2200 wrote to memory of 804 2200 rundll32.exe 29 PID 2200 wrote to memory of 804 2200 rundll32.exe 29 PID 2200 wrote to memory of 804 2200 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efdbeee44e46fb2c0c5d09b2fb4aa4629433ed8661006ad20c337dd6ec161540.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efdbeee44e46fb2c0c5d09b2fb4aa4629433ed8661006ad20c337dd6ec161540.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 3283⤵
- Program crash
PID:804
-
-