Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:56
Behavioral task
behavioral1
Sample
2c6a0ed0be2f18eea232456672ea50f6.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c6a0ed0be2f18eea232456672ea50f6.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
2c6a0ed0be2f18eea232456672ea50f6.dll
-
Size
11KB
-
MD5
2c6a0ed0be2f18eea232456672ea50f6
-
SHA1
9776325cd85a3b956d8bd564e1ca6d61d6313cb4
-
SHA256
c5d6ad12ae87843850325c7295f700f632e9ac1123afd36b5288df613872a318
-
SHA512
3e0697a4da7178f2e0264f8310916146aef2b201a20308d93f4645181327ffe5e50f87974091d1f543617ecfcf58b12f80f97604f80c7901559bd4bd13e0ece4
-
SSDEEP
192:0ixSXyPTdK/qsmxcAxkVtFEIr68fjRb7ONGdmUXkT21/QeWyWPobaI+EWcvRvufE:0ikiPRKSHcAxQtFbfVWm/1j7cfcvZ5Px
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2808-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2808 1864 rundll32.exe 49 PID 1864 wrote to memory of 2808 1864 rundll32.exe 49 PID 1864 wrote to memory of 2808 1864 rundll32.exe 49
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c6a0ed0be2f18eea232456672ea50f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c6a0ed0be2f18eea232456672ea50f6.dll,#12⤵
- Suspicious use of FindShellTrayWindow
PID:2808
-