Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 22:30
Behavioral task
behavioral1
Sample
fceb20116f1872c682d856bbd7a279c0.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fceb20116f1872c682d856bbd7a279c0.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
fceb20116f1872c682d856bbd7a279c0.dll
-
Size
954KB
-
MD5
fceb20116f1872c682d856bbd7a279c0
-
SHA1
75de12826eac5fc00075f254dcf8dfccacc4b832
-
SHA256
58ec0b6cf1ae4551c3c0b9853ec970aff98e7794e764f00bffdb6e5a094279c9
-
SHA512
f839665a2683f7b30dfe2f3254e432875bc3767e272ed92d11dbcbb61a62272b17271ebbf4fd41858d3b79e0557156b264b61c51fae011e62a23ee6e4b68d8f1
-
SSDEEP
12288:f1eXOC9iyCLc7Dao1Urb9LUtoSrFvR2dg9oSL+:NeXN9iphIQLIR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1248-3-0x0000000010000000-0x000000001014C000-memory.dmp upx behavioral1/memory/1248-2-0x0000000010000000-0x000000001014C000-memory.dmp upx behavioral1/memory/1248-1-0x0000000010000000-0x000000001014C000-memory.dmp upx behavioral1/memory/1248-0-0x0000000010000000-0x000000001014C000-memory.dmp upx behavioral1/memory/1248-4-0x0000000010000000-0x000000001014C000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2996 wrote to memory of 1248 2996 rundll32.exe 16 PID 2996 wrote to memory of 1248 2996 rundll32.exe 16 PID 2996 wrote to memory of 1248 2996 rundll32.exe 16 PID 2996 wrote to memory of 1248 2996 rundll32.exe 16 PID 2996 wrote to memory of 1248 2996 rundll32.exe 16 PID 2996 wrote to memory of 1248 2996 rundll32.exe 16 PID 2996 wrote to memory of 1248 2996 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fceb20116f1872c682d856bbd7a279c0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fceb20116f1872c682d856bbd7a279c0.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1248
-