Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 05:35
Behavioral task
behavioral1
Sample
ad90fbdb389dc714780341f7c947475ebbe19f312b396759345938a7f8bc98a0.dll
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad90fbdb389dc714780341f7c947475ebbe19f312b396759345938a7f8bc98a0.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ad90fbdb389dc714780341f7c947475ebbe19f312b396759345938a7f8bc98a0.dll
-
Size
16KB
-
MD5
1ad73432ccd797736eac48249cc393a4
-
SHA1
fb3c09123b137b450076f53e4cc4caa134beca61
-
SHA256
ad90fbdb389dc714780341f7c947475ebbe19f312b396759345938a7f8bc98a0
-
SHA512
32e52fb2c9273a9b487fc4b0701eac85f6533eed15787c4b903af239a3e099b041c1bb1c7e0adf9ea349d7112aaa46e1b9eb110478b5b1f3cf9ead999d878e61
-
SSDEEP
384:zRjDtxaLV3JZZLM0rne4P+p18Mkb1P1tl7VYBN+ek:lDrsdJZVMAeqPBrl7W6
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1340-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1340 1480 rundll32.exe 81 PID 1480 wrote to memory of 1340 1480 rundll32.exe 81 PID 1480 wrote to memory of 1340 1480 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad90fbdb389dc714780341f7c947475ebbe19f312b396759345938a7f8bc98a0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad90fbdb389dc714780341f7c947475ebbe19f312b396759345938a7f8bc98a0.dll,#12⤵PID:1340
-