Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 09:28
Behavioral task
behavioral1
Sample
63c9ca345b20c7ba812ab1113be9647c.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
63c9ca345b20c7ba812ab1113be9647c.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
63c9ca345b20c7ba812ab1113be9647c.dll
-
Size
81KB
-
MD5
63c9ca345b20c7ba812ab1113be9647c
-
SHA1
2467e0393c2fa6c56ee217bc25d68ada3c6ee2ba
-
SHA256
3eafacf7ad3eff4816272cbdfa214278937a5e0972086fd0cf9b20cd215a1095
-
SHA512
c7ab786a07249b290be068e32bf2c9eda2482eb13ce501e9de8308323d1da300bd55aa1bde607175b5681989e482a8b2e304b611b9c03ed935d4efe1999d6691
-
SSDEEP
1536:ervMwFTZ/2AINge5mwW/dbHru1WMSo3W9zzuZyys++jeyq7W:SPF9//eEwubHHMSo3qmyys/jeq
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4196-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 4196 2676 rundll32.exe 23 PID 2676 wrote to memory of 4196 2676 rundll32.exe 23 PID 2676 wrote to memory of 4196 2676 rundll32.exe 23
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63c9ca345b20c7ba812ab1113be9647c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63c9ca345b20c7ba812ab1113be9647c.dll,#12⤵PID:4196
-