Analysis
-
max time kernel
128s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08-08-2023 20:07
General
-
Target
b17f6d86a9b9d63e841046b6b999e1197e81b2cf5cc6bcf376be9698e5d0f84b.dll
-
Size
6.1MB
-
MD5
23540c83cc4620f33d45dea691c6888b
-
SHA1
bbdb961ad6fd8ad40cc3b8174242ca64f9a446a8
-
SHA256
b17f6d86a9b9d63e841046b6b999e1197e81b2cf5cc6bcf376be9698e5d0f84b
-
SHA512
e1a0bdded23488865ed658e53126c00856755a0d80d859ff021cd28eedb0e9ec7678812e61cb08434fcdefd5337f166383abee90d4f9057100ebb0d05cf8a9f5
-
SSDEEP
98304:Oz3igQYVx9ZE5nYiF/VoazNgNEGlqlls7aJAUMLy6ynCU/W4+EBEA4oPNp:EygQWbe/VooNy10s2ZMLylTtrB
Malware Config
Extracted
Family
systembc
C2
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 1 4796 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/4796-118-0x00007FFF8FC50000-0x00007FFF90723000-memory.dmp vmprotect behavioral1/memory/4796-125-0x00007FFF8FC50000-0x00007FFF90723000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid Process 4796 rundll32.exe 4796 rundll32.exe 4796 rundll32.exe 4796 rundll32.exe