Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:11
Behavioral task
behavioral1
Sample
ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll
-
Size
2.6MB
-
MD5
33caccc0d05ade349b17f60d60ef1521
-
SHA1
0de6fbfce077db388080d78b4659b1d03209f2e6
-
SHA256
ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914
-
SHA512
619fb6ada2a6b45c63a20cd7819ba27b3f28a894306378f086989196822c87e1d50c980fb109abee872b1abaab6a1674c691a9d4cb89e44e6d0ace40cd75f181
-
SSDEEP
49152:nVK4asaH2IFEAp+I4sZp9xkj+jYCTxWdhavRSl2rQp+hbvQPuQv:VhDxr9I4sZDxks1dv82a+SuS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4188-0-0x0000000074560000-0x0000000074C51000-memory.dmp themida -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4188 4120 rundll32.exe 83 PID 4120 wrote to memory of 4188 4120 rundll32.exe 83 PID 4120 wrote to memory of 4188 4120 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab16ee5288f57d85782dbe9247f914cb9faad0eccd6e16b7d19a22747618e914.dll,#12⤵PID:4188
-