Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 05:27
Behavioral task
behavioral1
Sample
bc9e58df6ea0df6f972a941ec8b3a411b92726e998ea94287adc522c50dd5084.dll
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bc9e58df6ea0df6f972a941ec8b3a411b92726e998ea94287adc522c50dd5084.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
bc9e58df6ea0df6f972a941ec8b3a411b92726e998ea94287adc522c50dd5084.dll
-
Size
170KB
-
MD5
2c5d11704dfaa05b914eb7cf2d6b9fb0
-
SHA1
9afe2e110d62e391e0ec8f0179370e3b0cd25175
-
SHA256
bc9e58df6ea0df6f972a941ec8b3a411b92726e998ea94287adc522c50dd5084
-
SHA512
d246207e0598046339302daadbe6648622eb280b58abb863c334e60133a1320c7d596b75b844122f71de072166fd49db571d97e9a62ae6e6cc70f1bd6357f6cc
-
SSDEEP
3072:+TtvejdXwDj5cciTeLOjRrJyRQFmHftiqibIojqlfI1+EWvqj:Y2XPbGO1JSIwftiqisoelfVa
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4984-133-0x0000000074E90000-0x0000000074EC1000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4984 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1420 wrote to memory of 4984 1420 rundll32.exe 81 PID 1420 wrote to memory of 4984 1420 rundll32.exe 81 PID 1420 wrote to memory of 4984 1420 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9e58df6ea0df6f972a941ec8b3a411b92726e998ea94287adc522c50dd5084.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9e58df6ea0df6f972a941ec8b3a411b92726e998ea94287adc522c50dd5084.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4984
-