Analysis
-
max time kernel
145s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:51
Behavioral task
behavioral1
Sample
28e387f73d9f2b7d6135ec018aeb67e3.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
28e387f73d9f2b7d6135ec018aeb67e3.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
28e387f73d9f2b7d6135ec018aeb67e3.dll
-
Size
65KB
-
MD5
28e387f73d9f2b7d6135ec018aeb67e3
-
SHA1
66fcbe431fd7a4b9f33be6ed358763a18cd46528
-
SHA256
70e15e7dae21b1c420438ec1406aec0ec83a3630ca04dd37a7d0a27c14fccbeb
-
SHA512
aef38b713746be09c91d164c10b96ab3cde7166607307db956be92aaf6d62e706398c8bbf4f20e3338d5cbb8d9742cfcdeb87a3138dca27ebc493b094f202c0c
-
SSDEEP
1536:dTzCc2mRx1t+EpH4/orGYdyffOdWN8U70JKXvez+/Q:dclWGiyffiWNT7XvvI
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 4080 rundll32.exe 96 4080 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4080 rundll32.exe 4080 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4080 3688 rundll32.exe 14 PID 3688 wrote to memory of 4080 3688 rundll32.exe 14 PID 3688 wrote to memory of 4080 3688 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28e387f73d9f2b7d6135ec018aeb67e3.dll,#11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28e387f73d9f2b7d6135ec018aeb67e3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3688