Analysis
-
max time kernel
35s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
aaee50b9f81bae8fda1a5cb9357f545b223192775a174f97bea47f1065d974d2.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
aaee50b9f81bae8fda1a5cb9357f545b223192775a174f97bea47f1065d974d2.dll
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
aaee50b9f81bae8fda1a5cb9357f545b223192775a174f97bea47f1065d974d2.dll
-
Size
116KB
-
MD5
a50488e150f48598bd516bfd38b34228
-
SHA1
842565427bd6aa7c2b4780d9bd429446d92c9091
-
SHA256
aaee50b9f81bae8fda1a5cb9357f545b223192775a174f97bea47f1065d974d2
-
SHA512
ef0b61b6f1bf53d880dfbe68df9c98196753d1101510deadac12d11291748c369200f8ef409d496f68e17febbd382e21faa5016bcb390c87b9d069f002eff006
-
SSDEEP
3072:xu3Zc6F5UQSvFwftpYglDcKjCCZaODOn:xu3Z5rU5vFItFlDV3a
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1880-56-0x0000000000180000-0x000000000018E000-memory.dmp upx behavioral1/memory/1880-60-0x0000000000180000-0x000000000018E000-memory.dmp upx behavioral1/memory/1880-59-0x0000000000180000-0x000000000018E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1880 1976 rundll32.exe 26 PID 1976 wrote to memory of 1880 1976 rundll32.exe 26 PID 1976 wrote to memory of 1880 1976 rundll32.exe 26 PID 1976 wrote to memory of 1880 1976 rundll32.exe 26 PID 1976 wrote to memory of 1880 1976 rundll32.exe 26 PID 1976 wrote to memory of 1880 1976 rundll32.exe 26 PID 1976 wrote to memory of 1880 1976 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aaee50b9f81bae8fda1a5cb9357f545b223192775a174f97bea47f1065d974d2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aaee50b9f81bae8fda1a5cb9357f545b223192775a174f97bea47f1065d974d2.dll,#12⤵PID:1880
-