Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 06:35
Behavioral task
behavioral1
Sample
39ac3493b61ff5ffa8620490036c9d6bb8304a9e0ab718424c43809bdbbed6d2.dll
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
39ac3493b61ff5ffa8620490036c9d6bb8304a9e0ab718424c43809bdbbed6d2.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
39ac3493b61ff5ffa8620490036c9d6bb8304a9e0ab718424c43809bdbbed6d2.dll
-
Size
72KB
-
MD5
4a411f41cb953193860d10548450fe50
-
SHA1
c71634462777d39ebb2d24e72c85716f0a05383b
-
SHA256
39ac3493b61ff5ffa8620490036c9d6bb8304a9e0ab718424c43809bdbbed6d2
-
SHA512
bc2d5d58db030b3e7f748854911fe5dba14405dc9efc9b935395757e18820bace00b47394278399022226486895213ca1292b7ea39dd5407f299e004b8dc19c9
-
SSDEEP
1536:3ToxyT1oNr2gw/+eMpTK2LuUewpHfFFEIhmPfylFGa8P74l0yReLqIDL:jgq1oNrlxKXw3FZMPfkm/9qIDL
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1128-56-0x0000000010000000-0x000000001005B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39ac3493b61ff5ffa8620490036c9d6bb8304a9e0ab718424c43809bdbbed6d2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39ac3493b61ff5ffa8620490036c9d6bb8304a9e0ab718424c43809bdbbed6d2.dll,#12⤵PID:1128
-