Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 23:38
Behavioral task
behavioral1
Sample
93b988b557f44703158ed43bab548a107c8a59d775b2e3bbd850618eff648d28.dll
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
93b988b557f44703158ed43bab548a107c8a59d775b2e3bbd850618eff648d28.dll
Resource
win10v2004-20220901-en
3 signatures
150 seconds
General
-
Target
93b988b557f44703158ed43bab548a107c8a59d775b2e3bbd850618eff648d28.dll
-
Size
43KB
-
MD5
c743bbc30d752b2ae6de9fc4611760e0
-
SHA1
c1b7089aaf4feb1879aef7c555f50c429510c9ab
-
SHA256
93b988b557f44703158ed43bab548a107c8a59d775b2e3bbd850618eff648d28
-
SHA512
f676418f547218b7a488b1d88bf4b934e8eba9bec0127014ff5e89edec5da50bab7fe8e7d5159b0dff19b1598cbdc423075a008ae57b8042fedef43992e62afc
-
SSDEEP
768:PLlDq5fPibv4m0wREr9VOL2shQ2hdSbIlxivNJD3la4ojSNsdhA9l/PH:zl2nibiwRETOLTthdSb+ivNJD3s4ofq3
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1436-56-0x0000000010000000-0x000000001007F000-memory.dmp upx behavioral1/memory/1436-58-0x0000000010000000-0x000000001007F000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 PID 1604 wrote to memory of 1436 1604 rundll32.exe 27 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93b988b557f44703158ed43bab548a107c8a59d775b2e3bbd850618eff648d28.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93b988b557f44703158ed43bab548a107c8a59d775b2e3bbd850618eff648d28.dll,#12⤵
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:1436
-