Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 09:13
Behavioral task
behavioral1
Sample
62c47d905c56bb920a25aa5141a14c04.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
62c47d905c56bb920a25aa5141a14c04.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
62c47d905c56bb920a25aa5141a14c04.dll
-
Size
61KB
-
MD5
62c47d905c56bb920a25aa5141a14c04
-
SHA1
121b5baa0289e8263c76538c5ed9393ca36d3e7f
-
SHA256
7cc4e3987d1a8f2042e8f60a9fa48986de7ced664a51f571286b24a65ad97368
-
SHA512
96bc3cbabd3716ec6a599a5b1a9f8d3eb6319c3513e28f0c6cfc568f125b6dd9a23609c7186067fe5da494be8923a4e9b927c3449ddf6f221753a021e75a5e57
-
SSDEEP
768:9xBtKtqyLU4XFL2XRGx8nA/FxtH8Fp3YZcG7UbN4ZB8zb0jnpyRp1/dJKgo0+6uu:90FSB0xGT3mUbN4kzbunYnjNoJ6ujS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2196-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2196 2224 rundll32.exe 1 PID 2224 wrote to memory of 2196 2224 rundll32.exe 1 PID 2224 wrote to memory of 2196 2224 rundll32.exe 1 PID 2224 wrote to memory of 2196 2224 rundll32.exe 1 PID 2224 wrote to memory of 2196 2224 rundll32.exe 1 PID 2224 wrote to memory of 2196 2224 rundll32.exe 1 PID 2224 wrote to memory of 2196 2224 rundll32.exe 1
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62c47d905c56bb920a25aa5141a14c04.dll,#11⤵PID:2196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62c47d905c56bb920a25aa5141a14c04.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224