Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 07:40
Behavioral task
behavioral1
Sample
1cd913e0beafc5afa82a7821054d4df90b06516ee7a2c33b81278ba514fe92ed.dll
Resource
win7-20231020-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cd913e0beafc5afa82a7821054d4df90b06516ee7a2c33b81278ba514fe92ed.dll
Resource
win10v2004-20231020-en
5 signatures
150 seconds
General
-
Target
1cd913e0beafc5afa82a7821054d4df90b06516ee7a2c33b81278ba514fe92ed.dll
-
Size
6.6MB
-
MD5
2140717f27fc63a93ed8af9ab43b9b16
-
SHA1
050ec47707d94d7f7f477fb37307950ce4f763c5
-
SHA256
1cd913e0beafc5afa82a7821054d4df90b06516ee7a2c33b81278ba514fe92ed
-
SHA512
f4a4a8dfb519d27aac1fdc80e138465b71600f2dffcb1e92093d9359c2b06bb6f90565fecaefe08b47685ebe794b1d8c46d74c8f8392284382f3194fda613516
-
SSDEEP
196608:B0kcy4+ARnEFj57uOE/nqKtI5TlBflP4Uj:B0kL4+AFohuOE/nqKiH4Uj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3812-0-0x0000000010000000-0x0000000010BBA000-memory.dmp vmprotect behavioral2/memory/3812-10-0x0000000010000000-0x0000000010BBA000-memory.dmp vmprotect behavioral2/memory/3812-13-0x0000000010000000-0x0000000010BBA000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3812 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3812 rundll32.exe 3812 rundll32.exe 3812 rundll32.exe 3812 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3812 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3812 4380 rundll32.exe 86 PID 4380 wrote to memory of 3812 4380 rundll32.exe 86 PID 4380 wrote to memory of 3812 4380 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1cd913e0beafc5afa82a7821054d4df90b06516ee7a2c33b81278ba514fe92ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1cd913e0beafc5afa82a7821054d4df90b06516ee7a2c33b81278ba514fe92ed.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3812
-