Analysis
-
max time kernel
4s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/08/2023, 04:39
Behavioral task
behavioral1
Sample
C.dll
Resource
win7-20230712-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
C.dll
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
C.dll
-
Size
4.2MB
-
MD5
ef2a78c97ba90e8429c3d1d37c179d33
-
SHA1
8ded75e609b1817f59b1c4f0c8a4397da49574c1
-
SHA256
143e56f0eb490729db24fc99e8fbafac53acef8517e17b063b211416910fc9ef
-
SHA512
1111d4b602871b264d0995673b1f27553d90f0bfb40d48d33bd21143e117a028fbb472b0120a7e05c5a6a5109b7a8b5634fddde90623aee7781db6244fd6f288
-
SSDEEP
98304:4HNh7Gv1vZCx2mkZxKRJz1UMMKLZNzhO5Cs:4HNsv1xmkZcRJxNLZNzC
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1968 1988 rundll32.exe 28 PID 1988 wrote to memory of 1968 1988 rundll32.exe 28 PID 1988 wrote to memory of 1968 1988 rundll32.exe 28 PID 1988 wrote to memory of 1968 1988 rundll32.exe 28 PID 1988 wrote to memory of 1968 1988 rundll32.exe 28 PID 1988 wrote to memory of 1968 1988 rundll32.exe 28 PID 1988 wrote to memory of 1968 1988 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\C.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\C.dll,#12⤵PID:1968
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get processorid3⤵PID:2340
-
-