Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 10:07
Behavioral task
behavioral1
Sample
1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll
-
Size
3.8MB
-
MD5
2aa482f1984ecd2f82410b1f702d44fe
-
SHA1
d8690cfc410056b4a9f85ea04428f2b65eea31ed
-
SHA256
1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070
-
SHA512
56ce04f68e7add842ffb7c237e8a9005aa779e35f1ecbb4ec2959c2e7a4e1c4bb1bc0689d4ed10d59212982a6ed96a178fa757a06a73ca9fd0217e648cce44c9
-
SSDEEP
98304:FWud4FFY0b8nu6tHZ8XKMsUefOSfeY6Yy4FPuR:Qud4zgaefhfeY6Yy4FP6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2460-39-0x0000000000730000-0x000000000073B000-memory.dmp upx behavioral1/memory/2460-40-0x0000000000730000-0x000000000073B000-memory.dmp upx -
resource yara_rule behavioral1/memory/2460-2-0x0000000010000000-0x00000000108AB000-memory.dmp vmprotect behavioral1/memory/2460-41-0x0000000010000000-0x00000000108AB000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2460 rundll32.exe 2460 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2460 2444 rundll32.exe 28 PID 2444 wrote to memory of 2460 2444 rundll32.exe 28 PID 2444 wrote to memory of 2460 2444 rundll32.exe 28 PID 2444 wrote to memory of 2460 2444 rundll32.exe 28 PID 2444 wrote to memory of 2460 2444 rundll32.exe 28 PID 2444 wrote to memory of 2460 2444 rundll32.exe 28 PID 2444 wrote to memory of 2460 2444 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460
-