Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 05:02
Behavioral task
behavioral1
Sample
6d4ed47cf1d253c9046ca7d0c57436db.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6d4ed47cf1d253c9046ca7d0c57436db.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
6d4ed47cf1d253c9046ca7d0c57436db.dll
-
Size
747KB
-
MD5
6d4ed47cf1d253c9046ca7d0c57436db
-
SHA1
18196e1ebd5b32fcab3476cad24672c4a4ad3296
-
SHA256
65406e5acb32e976bb86d4d171ae95f2eef20ca6faccea18b05759934607b5e5
-
SHA512
3f109d0071eb379cc60c59f21c950391b8ef55ce545b900f8cb21eb8ee6b0c7665beeafc27afcb29c265eb5243e10f745e05002704bb9d9d02b8ce2790a601bd
-
SSDEEP
12288:9rTmzUHgoZ4wcY6mN9ELoGd/VVz7V8KEpKIeyqEJtK8UeJixjFNehis3bKy:JIUH0wx6mN9ELH/TF8K2KBydJgPxQ+y
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4072-0-0x0000000000400000-0x00000000005B9000-memory.dmp vmprotect behavioral2/memory/4072-1-0x0000000000400000-0x00000000005B9000-memory.dmp vmprotect behavioral2/memory/4072-2-0x0000000000400000-0x00000000005B9000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4072 3196 rundll32.exe 29 PID 3196 wrote to memory of 4072 3196 rundll32.exe 29 PID 3196 wrote to memory of 4072 3196 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d4ed47cf1d253c9046ca7d0c57436db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d4ed47cf1d253c9046ca7d0c57436db.dll,#12⤵PID:4072
-