Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 01:39
Static task
static1
Behavioral task
behavioral1
Sample
657948a33e70d61e5f8939571cf4c140.dll
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
657948a33e70d61e5f8939571cf4c140.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
657948a33e70d61e5f8939571cf4c140.dll
-
Size
163KB
-
MD5
657948a33e70d61e5f8939571cf4c140
-
SHA1
372ab021bbdf261bc2b858025ccb3d1e9fb6dfdc
-
SHA256
065d399f6e84560e9c82831f9f2a2a43a7d853a27e922cc81d3bc5fcd1adfc56
-
SHA512
6404fc10e34c08259a3b5e8d71144d66c492d327d2f99d500595a485d27f936838390d01df9f3500d5032219e41809b1e2cc14511ccfbf736c841f5f572923fe
-
SSDEEP
3072:q97bXTUSpXLNl9vjBUCaLQ9L17ZDtKKxUQ//CVtcdCL9uKD3DFWmKd/NmOl6Zjh7:q97zTUSFplkqZlDD6e/FdY9uKDzk6ZF7
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 920 rundll32.exe 8 920 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1736 wrote to memory of 920 1736 rundll32.exe 27 PID 1736 wrote to memory of 920 1736 rundll32.exe 27 PID 1736 wrote to memory of 920 1736 rundll32.exe 27 PID 1736 wrote to memory of 920 1736 rundll32.exe 27 PID 1736 wrote to memory of 920 1736 rundll32.exe 27 PID 1736 wrote to memory of 920 1736 rundll32.exe 27 PID 1736 wrote to memory of 920 1736 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\657948a33e70d61e5f8939571cf4c140.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\657948a33e70d61e5f8939571cf4c140.dll,#12⤵
- Blocklisted process makes network request
PID:920
-