Analysis
-
max time kernel
31s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 01:22
Behavioral task
behavioral1
Sample
f1e0f3ea8ffc3723feefa7d7f1037098.dll
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f1e0f3ea8ffc3723feefa7d7f1037098.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
f1e0f3ea8ffc3723feefa7d7f1037098.dll
-
Size
8KB
-
MD5
f1e0f3ea8ffc3723feefa7d7f1037098
-
SHA1
7f2fee07d20757215ef5111599dee4d70145e81d
-
SHA256
859ad779718a6f32b24f77fead92a93f447b72a0d2448680352e35803758038d
-
SHA512
afb29b13d0093ec30933c624a0e345a9cd7569af80e2e548b8388d5cfbe0065273634dc39844e07c1f2cd806aec66e746836a0b8d0587d5024af771995d499ab
-
SSDEEP
96:A6oJmO/YdEXSDUB7ta4M8lbP5m/MM4odWLGS5cXuXCr2EmroO:ET/SIBRa4K/Zbdl2zf
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 1204 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 1204 2044 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1e0f3ea8ffc3723feefa7d7f1037098.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1e0f3ea8ffc3723feefa7d7f1037098.dll,#12⤵
- Blocklisted process makes network request
PID:1204