Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 20:30
Behavioral task
behavioral1
Sample
23540c83cc4620f33d45dea691c6888b.dll
Resource
win7-20230712-en
4 signatures
150 seconds
General
-
Target
23540c83cc4620f33d45dea691c6888b.dll
-
Size
6.1MB
-
MD5
23540c83cc4620f33d45dea691c6888b
-
SHA1
bbdb961ad6fd8ad40cc3b8174242ca64f9a446a8
-
SHA256
b17f6d86a9b9d63e841046b6b999e1197e81b2cf5cc6bcf376be9698e5d0f84b
-
SHA512
e1a0bdded23488865ed658e53126c00856755a0d80d859ff021cd28eedb0e9ec7678812e61cb08434fcdefd5337f166383abee90d4f9057100ebb0d05cf8a9f5
-
SSDEEP
98304:Oz3igQYVx9ZE5nYiF/VoazNgNEGlqlls7aJAUMLy6ynCU/W4+EBEA4oPNp:EygQWbe/VooNy10s2ZMLylTtrB
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 16 5032 rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/5032-133-0x00007FFF63CA0000-0x00007FFF64773000-memory.dmp vmprotect behavioral2/memory/5032-142-0x00007FFF63CA0000-0x00007FFF64773000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid Process 5032 rundll32.exe 5032 rundll32.exe 5032 rundll32.exe 5032 rundll32.exe