Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:07
Behavioral task
behavioral1
Sample
1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll
-
Size
3.8MB
-
MD5
2aa482f1984ecd2f82410b1f702d44fe
-
SHA1
d8690cfc410056b4a9f85ea04428f2b65eea31ed
-
SHA256
1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070
-
SHA512
56ce04f68e7add842ffb7c237e8a9005aa779e35f1ecbb4ec2959c2e7a4e1c4bb1bc0689d4ed10d59212982a6ed96a178fa757a06a73ca9fd0217e648cce44c9
-
SSDEEP
98304:FWud4FFY0b8nu6tHZ8XKMsUefOSfeY6Yy4FPuR:Qud4zgaefhfeY6Yy4FP6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1816-12-0x00000000028A0000-0x00000000028AB000-memory.dmp upx behavioral2/memory/1816-14-0x00000000028A0000-0x00000000028AB000-memory.dmp upx -
resource yara_rule behavioral2/memory/1816-0-0x0000000010000000-0x00000000108AB000-memory.dmp vmprotect behavioral2/memory/1816-15-0x0000000010000000-0x00000000108AB000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1816 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1816 2260 rundll32.exe 86 PID 2260 wrote to memory of 1816 2260 rundll32.exe 86 PID 2260 wrote to memory of 1816 2260 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1244f4683b6ae90ed4359ed7e12cab1fec56ae5503cfb7e7bfef2a589bdd9070.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816
-