Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:43
Behavioral task
behavioral1
Sample
22b28da742f6634182ef4483127d0dab.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
22b28da742f6634182ef4483127d0dab.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
22b28da742f6634182ef4483127d0dab.dll
-
Size
59KB
-
MD5
22b28da742f6634182ef4483127d0dab
-
SHA1
6cc6848c31411b4e4fbfb8276bc2d1d90b5ade75
-
SHA256
27de58201cde6e5e221f60b58be72b662515b19408447984873dbc65311c5f6c
-
SHA512
b92cbe688295c7b10a0578ac85047e7f4bd3885b877024da0d740151a09556dd27128d9f7a4796539986f8c4320ae413752f11b63eff6c7e7dc447d3dcb3bbd2
-
SSDEEP
1536:IykzkagzxAHEUfmMG1mxwuF184c4I2Peyh46k:IFzkasxWLupmf1nFMyh4j
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3932-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3932 4060 rundll32.exe 16 PID 4060 wrote to memory of 3932 4060 rundll32.exe 16 PID 4060 wrote to memory of 3932 4060 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22b28da742f6634182ef4483127d0dab.dll,#11⤵PID:3932
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22b28da742f6634182ef4483127d0dab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060