Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
29d754e5a7c171f642d92670834e495d.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
29d754e5a7c171f642d92670834e495d.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
29d754e5a7c171f642d92670834e495d.dll
-
Size
260KB
-
MD5
29d754e5a7c171f642d92670834e495d
-
SHA1
dc2052058db612dbfce3c661548244043f336a3b
-
SHA256
284f29257e6502bf52c826b411b82060f997ed690d26b636186a53486a930b27
-
SHA512
973b6f7de163a9de9e803795a62bbc1093b5f60acffa669f3e4b44a70b3ad7c04760ef1f1b60d159c547c2868de235be51ae75fe4518b410088fbd4655f579a9
-
SSDEEP
6144:q/kHy2ABxkOa6/LNOJ38jiJ+YeqDvLOB/yVf0D5h7:MkHyRxt7/asjGVFA/+0j
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ofeceposuc = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\29d754e5a7c171f642d92670834e495d.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 rundll32.exe 2808 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2808 4876 rundll32.exe 87 PID 4876 wrote to memory of 2808 4876 rundll32.exe 87 PID 4876 wrote to memory of 2808 4876 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29d754e5a7c171f642d92670834e495d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29d754e5a7c171f642d92670834e495d.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808
-