Analysis
-
max time kernel
112s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 09:39
Behavioral task
behavioral1
Sample
ce98a5fdaee4994a202adab7b2f7fed0137b30e87ce63092eb1edc85c255cdca.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ce98a5fdaee4994a202adab7b2f7fed0137b30e87ce63092eb1edc85c255cdca.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ce98a5fdaee4994a202adab7b2f7fed0137b30e87ce63092eb1edc85c255cdca.dll
-
Size
25KB
-
MD5
9e6df295c66aba7f1509fc0325e35e40
-
SHA1
d655d16c47c6451d8611ab3cd031eaef2b03f723
-
SHA256
ce98a5fdaee4994a202adab7b2f7fed0137b30e87ce63092eb1edc85c255cdca
-
SHA512
40814f9f3724cb16f49a178bb69e653fcc69c50668824af31c9b9f6c0d714cc1a2da6af1b27449266d3f18ced49e1a9fb5a252c0cbda26297218a4ec39e8ed43
-
SSDEEP
384:d4cvbhvCA6G1vaiuZRss4+p6h12zIf7jU0c0JOmKDCvjRiaaHC8V86rt+:d1zuG1pYRnZMvwsjXvUu7RaC+8+t+
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1564-133-0x0000000010000000-0x0000000010014000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1564 2348 rundll32.exe 82 PID 2348 wrote to memory of 1564 2348 rundll32.exe 82 PID 2348 wrote to memory of 1564 2348 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce98a5fdaee4994a202adab7b2f7fed0137b30e87ce63092eb1edc85c255cdca.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce98a5fdaee4994a202adab7b2f7fed0137b30e87ce63092eb1edc85c255cdca.dll,#12⤵PID:1564
-