Analysis
-
max time kernel
92s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 13:40
Behavioral task
behavioral1
Sample
55613889c1eb781ba371a2cd3b581304339e9d09c0d17e2703c4c0565d5a346d.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
55613889c1eb781ba371a2cd3b581304339e9d09c0d17e2703c4c0565d5a346d.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
55613889c1eb781ba371a2cd3b581304339e9d09c0d17e2703c4c0565d5a346d.dll
-
Size
248KB
-
MD5
0131f24ae617c5f181cac49d8a8851f0
-
SHA1
dd0c6aca787172ea3eb0fdceeb0ae591b61d5fb8
-
SHA256
55613889c1eb781ba371a2cd3b581304339e9d09c0d17e2703c4c0565d5a346d
-
SHA512
88729373d1029e707c36397780aff57b50be3d9ee81d866ad734cf00b3a1d3c7e0d4190ad56f38808883678ef3e0f50bbd18c56649bb46317e75e7529a1db3b7
-
SSDEEP
6144:tZvOWi66rpEBUPEEhM0BRS6EbMcjmvS6d3SBNQ/zzyMsax:tZvrizSlEhMCapyDMU/fsax
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1164-133-0x0000000000400000-0x0000000000484000-memory.dmp vmprotect behavioral2/memory/1164-134-0x0000000000400000-0x0000000000484000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3260 wrote to memory of 1164 3260 rundll32.exe 79 PID 3260 wrote to memory of 1164 3260 rundll32.exe 79 PID 3260 wrote to memory of 1164 3260 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55613889c1eb781ba371a2cd3b581304339e9d09c0d17e2703c4c0565d5a346d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55613889c1eb781ba371a2cd3b581304339e9d09c0d17e2703c4c0565d5a346d.dll,#12⤵PID:1164
-