Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-01-2025 18:28
Behavioral task
behavioral1
Sample
OnlineFix64.dll
Resource
win11-20241007-en
4 signatures
150 seconds
General
-
Target
OnlineFix64.dll
-
Size
9.9MB
-
MD5
42a032c968e9d0c145bf1bfc3b534a26
-
SHA1
6907806bd435475f10b285b076888dcd92554689
-
SHA256
fda7a9e6f445b18f4a8de9a0529188e3e486d0e8844f892a72b730973a63fa6a
-
SHA512
5ba0f0262cfb36d95d9abb8316b75b0f10cd8667c57a03fcaa4d5ebec857474fad4f3db886cbd1482bb728aef405f7796b040d9a48d6c415e37f9e685d4385ec
-
SSDEEP
98304:UXv9Q2/1jxJ4xlxSaHL8SLs50SJStEcWGgbZmYOzK:UX79jxJml57Ls50US+H4z
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\rundll32.exe attrib.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 656 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 656 wrote to memory of 5980 656 rundll32.exe 79 PID 656 wrote to memory of 5980 656 rundll32.exe 79 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5980 attrib.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OnlineFix64.dll,#11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Windows\system32\rundll32.exe2⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:5980
-