Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d98c29e75a8d4a9315e341dd167aaa3.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d98c29e75a8d4a9315e341dd167aaa3.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0d98c29e75a8d4a9315e341dd167aaa3.dll
-
Size
108KB
-
MD5
0d98c29e75a8d4a9315e341dd167aaa3
-
SHA1
2cfcbaa1a876730359342c6f4f53d079b2571727
-
SHA256
930a1bc0b50d395733b553ec811818463bd738c56d4001c9d1d170c6ef5cc894
-
SHA512
0eeba01bbbbf431bd498e372ac85bc5019e7efd29b465ea18607014f937a4ef124287b8cdedbf9f61fe5544b5aa9997367adbff9eca14b04d5b106fc56b15d55
-
SSDEEP
3072:P/tG5qCLVMFqE4dAQiYWeFfh0nmCemKF2MitWT7:XtEgqPdAkbFfheSH+sT
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER\iexplore.exe = "32" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER\iexplore.exe = "32" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 3140 1832 rundll32.exe 89 PID 1832 wrote to memory of 3140 1832 rundll32.exe 89 PID 1832 wrote to memory of 3140 1832 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d98c29e75a8d4a9315e341dd167aaa3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d98c29e75a8d4a9315e341dd167aaa3.dll,#12⤵
- Modifies Internet Explorer settings
PID:3140
-