Analysis
-
max time kernel
112s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:27
Behavioral task
behavioral1
Sample
0922c54fe24fccc64e6dcda11c409c631341280e714b3a68adb245b92dab6296.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0922c54fe24fccc64e6dcda11c409c631341280e714b3a68adb245b92dab6296.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0922c54fe24fccc64e6dcda11c409c631341280e714b3a68adb245b92dab6296.dll
-
Size
70KB
-
MD5
0a0026431541bd9deb53f99dabc0f66b
-
SHA1
b2f3b8ba4b603b403bb310a2948a571acd726403
-
SHA256
0922c54fe24fccc64e6dcda11c409c631341280e714b3a68adb245b92dab6296
-
SHA512
9ab26cfbd2fad631a5337f4b31a757c172a8e4297b0e1eacf150fdde8608dee5223d7bceee8409012b406b727d3793e20730b052dbcd3be956112b14ac2cd043
-
SSDEEP
768:X7jo4o9gMh1rvr2WP28x99/uEkjh/a6DoswGd/:rjoLrD2WPLDHkFa/sw
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DFDxm = "D:\\1\\rundll32.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2736 wrote to memory of 1556 2736 rundll32.exe rundll32.exe PID 2736 wrote to memory of 1556 2736 rundll32.exe rundll32.exe PID 2736 wrote to memory of 1556 2736 rundll32.exe rundll32.exe PID 1556 wrote to memory of 4904 1556 rundll32.exe svchost.exe PID 1556 wrote to memory of 4904 1556 rundll32.exe svchost.exe PID 1556 wrote to memory of 4904 1556 rundll32.exe svchost.exe PID 1556 wrote to memory of 4904 1556 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0922c54fe24fccc64e6dcda11c409c631341280e714b3a68adb245b92dab6296.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0922c54fe24fccc64e6dcda11c409c631341280e714b3a68adb245b92dab6296.dll,#12⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\windows\SysWOW64\svchost.exec:\windows\SysWOW64\svchost.exe3⤵PID:4904