Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 02:26
Behavioral task
behavioral1
Sample
0b9ba00864835a7f82a300c744244d17.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b9ba00864835a7f82a300c744244d17.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0b9ba00864835a7f82a300c744244d17.dll
-
Size
58KB
-
MD5
0b9ba00864835a7f82a300c744244d17
-
SHA1
9536290791879ed6ea7176eb9510107bb420b433
-
SHA256
dc49b14f8ad14d6f8d6a6b9521d8266152daeb36d92b5e4be35d25649e9f1425
-
SHA512
0b69dd3db8f05408d6f8dc30136aa7f8bec3518ace08b16524273c11fc25b41896073cc766c2bdc0dbaed7cfb4ffcb2bd0ca3ad54e8b731437f5843208c2320f
-
SSDEEP
1536:+H/qlrlW7ubHANA9RFoE6ACJxnjPJGDX27Djpq3F:+H/qFlWabAoFb6R9JMX27DVq1
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4952-0-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5244 wrote to memory of 4952 5244 rundll32.exe 14 PID 5244 wrote to memory of 4952 5244 rundll32.exe 14 PID 5244 wrote to memory of 4952 5244 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b9ba00864835a7f82a300c744244d17.dll,#11⤵PID:4952
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b9ba00864835a7f82a300c744244d17.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5244