Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2174753141ce9552c240e5d4f4569fba.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2174753141ce9552c240e5d4f4569fba.dll
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
2174753141ce9552c240e5d4f4569fba.dll
-
Size
60KB
-
MD5
2174753141ce9552c240e5d4f4569fba
-
SHA1
e855128c72e23c57d928c158d5f8a95626a6999a
-
SHA256
eb118af21c390163ee684f70f3aa9f4fdc4c599a0d627656c8e6bf76093bf782
-
SHA512
e0eceff4ac507bcb4d6b7188af2997a4b8f6cf58390e5025b3460b97e170ac2a473d704cf1e2d2a96efe0485c3e6a007b10883b9cbb747e7e60b2ecbec61731b
-
SSDEEP
768:l5T2umehK9Bd0hlisFlgef63r7J+OQB2QOyJkeghQ:l5THhK9BMaeSR+OQFOBS
Score
6/10
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3032 2992 rundll32.exe 28 PID 2992 wrote to memory of 3032 2992 rundll32.exe 28 PID 2992 wrote to memory of 3032 2992 rundll32.exe 28 PID 2992 wrote to memory of 3032 2992 rundll32.exe 28 PID 2992 wrote to memory of 3032 2992 rundll32.exe 28 PID 2992 wrote to memory of 3032 2992 rundll32.exe 28 PID 2992 wrote to memory of 3032 2992 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2174753141ce9552c240e5d4f4569fba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2174753141ce9552c240e5d4f4569fba.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-