Analysis
-
max time kernel
141s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:04
Behavioral task
behavioral1
Sample
37316734cce57a1c055992afc60053bf.dll
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
37316734cce57a1c055992afc60053bf.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
37316734cce57a1c055992afc60053bf.dll
-
Size
61KB
-
MD5
37316734cce57a1c055992afc60053bf
-
SHA1
5c961ef48bdfae5be04bf60d67d39186d375451c
-
SHA256
f03e698eadee4aa77bf193e5589042b6fef0464a3a395705b9f8f315fb67b1ed
-
SHA512
7eb18b7578058091311afe134d42ca5a539f39669097cb4e8fcd154e3100537755b9acbcd7a5f28f3974491dd2fc96c18e6a943d91c758f05b95eafbad7316ed
-
SSDEEP
768:GmTeWqa4wq+/QIc9I0EbY2GdLWswED73AejDQM0x6XrBKTK0nb6lVOFxw72jB648:GLWKwR903cJW73MMfrHjlgU72jkSaR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2220-0-0x0000000010000000-0x000000001002C000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 rundll32.exe 2220 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 2220 392 rundll32.exe 88 PID 392 wrote to memory of 2220 392 rundll32.exe 88 PID 392 wrote to memory of 2220 392 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37316734cce57a1c055992afc60053bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37316734cce57a1c055992afc60053bf.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-