Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 09:31
Behavioral task
behavioral1
Sample
48514490face0a58cd5ea063e7de28e0.dll
Resource
win7-20230712-en
4 signatures
150 seconds
General
-
Target
48514490face0a58cd5ea063e7de28e0.dll
-
Size
6.4MB
-
MD5
48514490face0a58cd5ea063e7de28e0
-
SHA1
ca52f90d5d6995f68bde1daf3900b3854431a3dd
-
SHA256
11f88c287b501abb341631221d59ef63089baa83faecbf222c3ba618e5f49456
-
SHA512
d1fdc7b7420f03dc29b9cd447a1235c34dab75b10b977b0d7cc72b429001a79d588d57f5d91165c4aff349313f6d76016ef44899f50963d3d774a97bfdcf1a48
-
SSDEEP
196608:NZwmQb62Pk1t+w69MCaSuxu70XSUAFTNknuFkJ:TW62Pk1t+JJuI70CbHe
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 2312 rundll32.exe -
resource yara_rule behavioral2/memory/2312-134-0x00007FFAD4CC0000-0x00007FFAD57D2000-memory.dmp vmprotect behavioral2/memory/2312-142-0x00007FFAD4CC0000-0x00007FFAD57D2000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe