Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 10:37
Behavioral task
behavioral1
Sample
79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll
Resource
win10v2004-20231020-en
General
-
Target
79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll
-
Size
8.7MB
-
MD5
f1cde6a3091a1dac8a0fb5e95f78a418
-
SHA1
2e52eb7da9f30b3153590f91f68a113a317a4660
-
SHA256
79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8
-
SHA512
1f44ecbdd4739bcf0dfb7e7440b3b360022a16fad0e364cb2684c20210bd771d3e0d9b11a42f96156af6f7f0cd3bd1a6a6496570677f18a377f90b7aac5ba9d2
-
SSDEEP
196608:kH3dW2EbgSeKwInFCg0FAcASGnlxTSLhLojTWud4zgaefhfeY6Yy4FPZ:Y3dmFGFhPGnbTshLoGudQ/eZePYy45Z
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/396-0-0x0000000010000000-0x00000000108B1000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 396 3456 rundll32.exe 83 PID 3456 wrote to memory of 396 3456 rundll32.exe 83 PID 3456 wrote to memory of 396 3456 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79898f9079cf0f5e4d869cd2022265e52d05a901111f409f64759c43cf15cba8.dll,#12⤵PID:396
-