Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 05:02
Behavioral task
behavioral1
Sample
6d4ed47cf1d253c9046ca7d0c57436db.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6d4ed47cf1d253c9046ca7d0c57436db.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
6d4ed47cf1d253c9046ca7d0c57436db.dll
-
Size
747KB
-
MD5
6d4ed47cf1d253c9046ca7d0c57436db
-
SHA1
18196e1ebd5b32fcab3476cad24672c4a4ad3296
-
SHA256
65406e5acb32e976bb86d4d171ae95f2eef20ca6faccea18b05759934607b5e5
-
SHA512
3f109d0071eb379cc60c59f21c950391b8ef55ce545b900f8cb21eb8ee6b0c7665beeafc27afcb29c265eb5243e10f745e05002704bb9d9d02b8ce2790a601bd
-
SSDEEP
12288:9rTmzUHgoZ4wcY6mN9ELoGd/VVz7V8KEpKIeyqEJtK8UeJixjFNehis3bKy:JIUH0wx6mN9ELH/TF8K2KBydJgPxQ+y
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2364-0-0x0000000000D30000-0x0000000000EE9000-memory.dmp vmprotect behavioral1/memory/2364-2-0x0000000000D30000-0x0000000000EE9000-memory.dmp vmprotect behavioral1/memory/2364-1-0x0000000000D30000-0x0000000000EE9000-memory.dmp vmprotect behavioral1/memory/2364-3-0x0000000000D30000-0x0000000000EE9000-memory.dmp vmprotect behavioral1/memory/2364-4-0x0000000000D30000-0x0000000000EE9000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2364 1700 rundll32.exe 16 PID 1700 wrote to memory of 2364 1700 rundll32.exe 16 PID 1700 wrote to memory of 2364 1700 rundll32.exe 16 PID 1700 wrote to memory of 2364 1700 rundll32.exe 16 PID 1700 wrote to memory of 2364 1700 rundll32.exe 16 PID 1700 wrote to memory of 2364 1700 rundll32.exe 16 PID 1700 wrote to memory of 2364 1700 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d4ed47cf1d253c9046ca7d0c57436db.dll,#11⤵PID:2364
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d4ed47cf1d253c9046ca7d0c57436db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700