Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 11:57
Behavioral task
behavioral1
Sample
52f7ebf44ecf08b9bef8fbc556d45fd8772e881feab94b56765ed71ab7b7254d.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
52f7ebf44ecf08b9bef8fbc556d45fd8772e881feab94b56765ed71ab7b7254d.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
52f7ebf44ecf08b9bef8fbc556d45fd8772e881feab94b56765ed71ab7b7254d.dll
-
Size
66KB
-
MD5
425b66db1a4c8380d66cbeabaab3743f
-
SHA1
ecd3f3b98d8ba833c52e1ed06796fc3d6b454430
-
SHA256
52f7ebf44ecf08b9bef8fbc556d45fd8772e881feab94b56765ed71ab7b7254d
-
SHA512
f49a8fc7032c441ca3c056ba7faf61985fdad4e60daf192a349138ad3042880770d971360ebfb953a7ae68831487fd04646dc137554510cff87cceb67eb09ce2
-
SSDEEP
1536:9hFWzkSSaEIYRax853smFifWlDkhE/JZm:nFeZS/ax8534Wlze
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2340-133-0x0000000010000000-0x0000000010012000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2340 1388 rundll32.exe 83 PID 1388 wrote to memory of 2340 1388 rundll32.exe 83 PID 1388 wrote to memory of 2340 1388 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52f7ebf44ecf08b9bef8fbc556d45fd8772e881feab94b56765ed71ab7b7254d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52f7ebf44ecf08b9bef8fbc556d45fd8772e881feab94b56765ed71ab7b7254d.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-