Analysis
-
max time kernel
118s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 10:16
Behavioral task
behavioral1
Sample
62813c6cab9234e83949fcc563c33b57.dll
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
General
-
Target
62813c6cab9234e83949fcc563c33b57.dll
-
Size
6.0MB
-
MD5
62813c6cab9234e83949fcc563c33b57
-
SHA1
474c9abc14fea035d0e80128dbd7260f0cbc42b2
-
SHA256
b2b82c1977c17aec7ba0074f56c0d61100e616a0ce72dab748ec4269db6c0793
-
SHA512
a29cdda3218566509cfc3d07b50bfe9ece45fd6a57cb12b649b283204191326e30746bc9d33c63b2e8281b65fd1f19cc79092b81e8cd67d593010c3574986542
-
SSDEEP
98304:Yk/CgBuUFSDyJ6FqBh2Rvtu9+GdULsSuPbm5u1et8yDD27AadUEpnoj:DBumcyJ6O3LdCgPbSket8yDDTsGj
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 14 1772 rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/1772-133-0x00007FFA6EEB0000-0x00007FFA6F934000-memory.dmp vmprotect behavioral2/memory/1772-142-0x00007FFA6EEB0000-0x00007FFA6F934000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 1772 rundll32.exe 1772 rundll32.exe 1772 rundll32.exe 1772 rundll32.exe