Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:51
Behavioral task
behavioral1
Sample
28e387f73d9f2b7d6135ec018aeb67e3.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
28e387f73d9f2b7d6135ec018aeb67e3.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
28e387f73d9f2b7d6135ec018aeb67e3.dll
-
Size
65KB
-
MD5
28e387f73d9f2b7d6135ec018aeb67e3
-
SHA1
66fcbe431fd7a4b9f33be6ed358763a18cd46528
-
SHA256
70e15e7dae21b1c420438ec1406aec0ec83a3630ca04dd37a7d0a27c14fccbeb
-
SHA512
aef38b713746be09c91d164c10b96ab3cde7166607307db956be92aaf6d62e706398c8bbf4f20e3338d5cbb8d9742cfcdeb87a3138dca27ebc493b094f202c0c
-
SSDEEP
1536:dTzCc2mRx1t+EpH4/orGYdyffOdWN8U70JKXvez+/Q:dclWGiyffiWNT7XvvI
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 3040 rundll32.exe 7 3040 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3040 2216 rundll32.exe 28 PID 2216 wrote to memory of 3040 2216 rundll32.exe 28 PID 2216 wrote to memory of 3040 2216 rundll32.exe 28 PID 2216 wrote to memory of 3040 2216 rundll32.exe 28 PID 2216 wrote to memory of 3040 2216 rundll32.exe 28 PID 2216 wrote to memory of 3040 2216 rundll32.exe 28 PID 2216 wrote to memory of 3040 2216 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28e387f73d9f2b7d6135ec018aeb67e3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28e387f73d9f2b7d6135ec018aeb67e3.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3040
-