Analysis
-
max time kernel
124s -
max time network
139s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
18-11-2021 15:53
Static task
static1
Behavioral task
behavioral1
Sample
0c2e254376127f76d44fc9276000697e45a2977fca4384705e84994ab63fdc37.dll
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0c2e254376127f76d44fc9276000697e45a2977fca4384705e84994ab63fdc37.dll
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
0c2e254376127f76d44fc9276000697e45a2977fca4384705e84994ab63fdc37.dll
-
Size
115KB
-
MD5
abcecad6ec78064bf7de52f3cda8e604
-
SHA1
b4a00d993b9354a8f337600999eeb578b0065de2
-
SHA256
0c2e254376127f76d44fc9276000697e45a2977fca4384705e84994ab63fdc37
-
SHA512
cde2f88377073e7b579a0005abea7207c5048026fcb245e538607db17509ffb891eef136018e810cd7705b0985b76be235f9a6387270e111d003e40fb98f8c4d
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3784 rundll32.exe 3784 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.execmd.exedescription pid process target process PID 3784 wrote to memory of 4228 3784 rundll32.exe cmd.exe PID 3784 wrote to memory of 4228 3784 rundll32.exe cmd.exe PID 4228 wrote to memory of 4416 4228 cmd.exe PING.EXE PID 4228 wrote to memory of 4416 4228 cmd.exe PING.EXE PID 4228 wrote to memory of 4488 4228 cmd.exe rundll32.exe PID 4228 wrote to memory of 4488 4228 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c2e254376127f76d44fc9276000697e45a2977fca4384705e84994ab63fdc37.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Windows\system32\rundll32.exe Y3DPOA2⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 23⤵
- Runs ping.exe
PID:4416
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe Y3DPOA3⤵PID:4488
-
-