Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 07:50
Behavioral task
behavioral1
Sample
f35a4c795921a5cb233ef2bda07c95d25838f310d4ffbf3ac648869b4a816007.dll
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
f35a4c795921a5cb233ef2bda07c95d25838f310d4ffbf3ac648869b4a816007.dll
-
Size
3.8MB
-
MD5
5e53980faa485079efa6c4086c616e4c
-
SHA1
842cf038f0c4888fbafa3a047bedb453938c812f
-
SHA256
f35a4c795921a5cb233ef2bda07c95d25838f310d4ffbf3ac648869b4a816007
-
SHA512
2fb205b51183d50c384b1abd916122d7376dcae9f41fc89f45811cb629d9446b8ce220f85e49b052f5a6759c871744d1aa2fbf524e3452eb20977fb54dc34b18
-
SSDEEP
98304:DzlTfsrvk6+MeL0N/JWbC294DLdZLBYPNYVyqydxjvZq:DzlDsbaMeL0BJWbCE2LdYuSdx9q
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2752-40-0x0000000000270000-0x000000000027B000-memory.dmp upx behavioral1/memory/2752-42-0x0000000000270000-0x000000000027B000-memory.dmp upx -
resource yara_rule behavioral1/memory/2752-2-0x0000000010000000-0x00000000108B4000-memory.dmp vmprotect behavioral1/memory/2752-41-0x0000000010000000-0x00000000108B4000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2752 2024 rundll32.exe 28 PID 2024 wrote to memory of 2752 2024 rundll32.exe 28 PID 2024 wrote to memory of 2752 2024 rundll32.exe 28 PID 2024 wrote to memory of 2752 2024 rundll32.exe 28 PID 2024 wrote to memory of 2752 2024 rundll32.exe 28 PID 2024 wrote to memory of 2752 2024 rundll32.exe 28 PID 2024 wrote to memory of 2752 2024 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f35a4c795921a5cb233ef2bda07c95d25838f310d4ffbf3ac648869b4a816007.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f35a4c795921a5cb233ef2bda07c95d25838f310d4ffbf3ac648869b4a816007.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2752
-