Analysis
-
max time kernel
3s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 20:00
Behavioral task
behavioral1
Sample
6587e9acde10ca11ea3c6673753af630029d0782467c633ada1ea257f47e4759.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6587e9acde10ca11ea3c6673753af630029d0782467c633ada1ea257f47e4759.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
6587e9acde10ca11ea3c6673753af630029d0782467c633ada1ea257f47e4759.dll
-
Size
137KB
-
MD5
4389e962066a2de19101daf6b2628e26
-
SHA1
74e29e7e2f5087dbef8ec1095e8cc52194765d22
-
SHA256
6587e9acde10ca11ea3c6673753af630029d0782467c633ada1ea257f47e4759
-
SHA512
c12bef8adfe14b00c3ffdb34a1479520c81c3ae8d13d7f8b3bd1306d51e233858ff8c1d2bb0b467845c3bc139010557ba663e51c553611ddfea1b80b0a9b2c21
-
SSDEEP
1536:6Rw9k6k1FrHc5FpgarkKHqr80sZCWs5d1cxDvxWNz8az:/cHr8HpDQKHlrUd8vEt8m
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1380-56-0x0000000010000000-0x0000000010017000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 940 wrote to memory of 1380 940 rundll32.exe 28 PID 940 wrote to memory of 1380 940 rundll32.exe 28 PID 940 wrote to memory of 1380 940 rundll32.exe 28 PID 940 wrote to memory of 1380 940 rundll32.exe 28 PID 940 wrote to memory of 1380 940 rundll32.exe 28 PID 940 wrote to memory of 1380 940 rundll32.exe 28 PID 940 wrote to memory of 1380 940 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6587e9acde10ca11ea3c6673753af630029d0782467c633ada1ea257f47e4759.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6587e9acde10ca11ea3c6673753af630029d0782467c633ada1ea257f47e4759.dll,#12⤵PID:1380
-