Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 04:27
Behavioral task
behavioral1
Sample
5417ec491a49a26a619e4b3581308881.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5417ec491a49a26a619e4b3581308881.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5417ec491a49a26a619e4b3581308881.dll
-
Size
10KB
-
MD5
5417ec491a49a26a619e4b3581308881
-
SHA1
399572fb5f8d07a165d7ce84f2a3f0e0beaddeaf
-
SHA256
4f5b8ad9c53986d1513531b0f91c2b35638b55e70c6ffee385ca6fe967edc982
-
SHA512
dd83bd4d750bd2c891d167d7e479bbb6cbc76f1805edd412594048567830f8a9790b4dfb9d43e1359f1c60c2dea10654ee31167c68c6d3198d906dc7d40be9e4
-
SSDEEP
192:Iq+bjrrYbl0qY7VkA0dNkyHHSOrMjT4aT0R3EmAWQW:IqRbVY7VkLX7MjTjWQW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2528-0-0x0000000010000000-0x000000001000B000-memory.dmp upx behavioral1/memory/2528-1-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2528 1740 rundll32.exe 28 PID 1740 wrote to memory of 2528 1740 rundll32.exe 28 PID 1740 wrote to memory of 2528 1740 rundll32.exe 28 PID 1740 wrote to memory of 2528 1740 rundll32.exe 28 PID 1740 wrote to memory of 2528 1740 rundll32.exe 28 PID 1740 wrote to memory of 2528 1740 rundll32.exe 28 PID 1740 wrote to memory of 2528 1740 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5417ec491a49a26a619e4b3581308881.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5417ec491a49a26a619e4b3581308881.dll,#12⤵PID:2528
-