Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-02-2023 19:15
Behavioral task
behavioral1
Sample
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll
Resource
win10v2004-20230220-en
General
-
Target
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll
-
Size
1.2MB
-
MD5
78799835749f617477be3bb34c0acf92
-
SHA1
c9ac4980f077aeec6fb6e5e64e86b17b39a49e03
-
SHA256
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588
-
SHA512
afa0e4435b40518a876adb65e6beca36aaad97474b3ed586356c19a648e0535eebc8b9e0a196b36fb5f1b69eaa4fb92f1a48e36b3e984af76d50f35b20a1d68e
-
SSDEEP
24576:p4rnKiBoHQRGi4w3CIqzT3wzHjf6cCdJWSJreEgdm+I9J2lQJssT6IJ+04BXvqiC:p4ONHxZwyIc3wv6dNkZdZi2lQ+smIJUy
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1752-54-0x0000000000170000-0x0000000000188000-memory.dmp upx behavioral1/memory/1752-55-0x0000000000170000-0x0000000000188000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe PID 1808 wrote to memory of 1752 1808 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll,#12⤵PID:1752