Analysis
-
max time kernel
82s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 20:08
Behavioral task
behavioral1
Sample
dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dnlib.dll
Resource
win10v2004-20241007-en
General
-
Target
dnlib.dll
-
Size
1.1MB
-
MD5
508ccde8bc7003696f32af7054ca3d97
-
SHA1
1f6a0303c5ae5dc95853ec92fd8b979683c3f356
-
SHA256
4758c7c39522e17bf93b3993ada4a1f7dd42bb63331bac0dcd729885e1ba062a
-
SHA512
92a59a2e1f6bf0ce512d21cf4148fe027b3a98ed6da46925169a4d0d9835a7a4b1374ba0be84e576d9a8d4e45cb9c2336e1f5bd1ea53e39f0d8553db264e746d
-
SSDEEP
24576:WHjoaczZfdE55hHl0WQ/OO4yb99MANKtv7f2dcME:tm/BQWgww
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid Process 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid Process Token: SeDebugPrivilege 3568 taskmgr.exe Token: SeSystemProfilePrivilege 3568 taskmgr.exe Token: SeCreateGlobalPrivilege 3568 taskmgr.exe Token: 33 3568 taskmgr.exe Token: SeIncBasePriorityPrivilege 3568 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid Process 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid Process 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dnlib.dll,#11⤵PID:2696
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3568
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4388