Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 04:22
Behavioral task
behavioral1
Sample
bd1864243321bea9cb24a242cd4505ed2054d3312e098d5dc45b0315d1120dd2.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bd1864243321bea9cb24a242cd4505ed2054d3312e098d5dc45b0315d1120dd2.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
bd1864243321bea9cb24a242cd4505ed2054d3312e098d5dc45b0315d1120dd2.dll
-
Size
237KB
-
MD5
3f02243481bf7a6ab016c52f87ea6ac7
-
SHA1
d06c43ca2df261684991ca8d9259a64f54a8a332
-
SHA256
bd1864243321bea9cb24a242cd4505ed2054d3312e098d5dc45b0315d1120dd2
-
SHA512
24301e8d6f1b625a7636b1b81b6ffd1fc859265f334dd1353deb47fa7e0e27a6258d0b7c6cb83f3546520e297f3b7b3807cc0fbdcc9a8d75bf471366d41c2e97
-
SSDEEP
3072:LawtQBD5BOR2QwkXBYoR9dfPTza6JvvWauCYXilJbg501tFKc/acziOf:GwtKDswkBYK5Tz77uCYXilJbg5O5/9W
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1684-57-0x0000000074590000-0x00000000745DD000-memory.dmp upx behavioral1/memory/1684-59-0x0000000074590000-0x00000000745DD000-memory.dmp upx behavioral1/memory/1684-60-0x0000000074590000-0x00000000745DD000-memory.dmp upx behavioral1/memory/1684-62-0x0000000074590000-0x00000000745DD000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1684 1968 rundll32.exe 28 PID 1968 wrote to memory of 1684 1968 rundll32.exe 28 PID 1968 wrote to memory of 1684 1968 rundll32.exe 28 PID 1968 wrote to memory of 1684 1968 rundll32.exe 28 PID 1968 wrote to memory of 1684 1968 rundll32.exe 28 PID 1968 wrote to memory of 1684 1968 rundll32.exe 28 PID 1968 wrote to memory of 1684 1968 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd1864243321bea9cb24a242cd4505ed2054d3312e098d5dc45b0315d1120dd2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd1864243321bea9cb24a242cd4505ed2054d3312e098d5dc45b0315d1120dd2.dll,#12⤵PID:1684
-