Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 17:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07fbeb9588e1e290625ee238bc3a44a3.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
07fbeb9588e1e290625ee238bc3a44a3.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
07fbeb9588e1e290625ee238bc3a44a3.dll
-
Size
14KB
-
MD5
07fbeb9588e1e290625ee238bc3a44a3
-
SHA1
75b011c32fb26a0e34a8b49141a77a231cbb8bb5
-
SHA256
55c77bf424b0b64395020bbc119d20cd3472eb2eb831daee1cb04bda6f29bcd1
-
SHA512
8566bf18c17ff7a7a39eefa8c435eb5504de075c6cdd02fa4bace0418527bab30138572a62cfee313b73fc0a91edd2b63f9bb31711f0ae24aa07197798a85d53
-
SSDEEP
24:eH1GSdrCyboYaJ8P1cH4sQ6tnfKW4tsJAR/N1+dhKwsl/rx5w/oyC2hBuBe7ivpN:yhjHaNxkzc8we/dWfuBeuR5chg
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2120 1140 rundll32.exe 28 PID 1140 wrote to memory of 2120 1140 rundll32.exe 28 PID 1140 wrote to memory of 2120 1140 rundll32.exe 28 PID 1140 wrote to memory of 2120 1140 rundll32.exe 28 PID 1140 wrote to memory of 2120 1140 rundll32.exe 28 PID 1140 wrote to memory of 2120 1140 rundll32.exe 28 PID 1140 wrote to memory of 2120 1140 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07fbeb9588e1e290625ee238bc3a44a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07fbeb9588e1e290625ee238bc3a44a3.dll,#12⤵PID:2120
-