Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 15:44
Behavioral task
behavioral1
Sample
4963964c6c946961a1c0f6afb0776f14.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4963964c6c946961a1c0f6afb0776f14.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
4963964c6c946961a1c0f6afb0776f14.dll
-
Size
35KB
-
MD5
4963964c6c946961a1c0f6afb0776f14
-
SHA1
af1becdb047de870cda49f9036e84fb52b1ec6f9
-
SHA256
a969d78d1039f75d35a049b5a799608ef834b32d154a183a6365ddce25f5cddf
-
SHA512
5ae9125d1664594b481f03482a9117d3b81d4ee6f9099dc0162f3013bf802c4599b511d899ec39933a11309f4b40c2acd062416dff0f9484420aa994f168ed6e
-
SSDEEP
768:Ks8Nd+zgQTB5+aBTCjMAd7G+EfTte+uf2Qb9Rb:Krd+zx2a5Cj/dC+Gsjz
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2112 rundll32.exe 5 2112 rundll32.exe 6 2112 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2112 1720 rundll32.exe 28 PID 1720 wrote to memory of 2112 1720 rundll32.exe 28 PID 1720 wrote to memory of 2112 1720 rundll32.exe 28 PID 1720 wrote to memory of 2112 1720 rundll32.exe 28 PID 1720 wrote to memory of 2112 1720 rundll32.exe 28 PID 1720 wrote to memory of 2112 1720 rundll32.exe 28 PID 1720 wrote to memory of 2112 1720 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4963964c6c946961a1c0f6afb0776f14.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4963964c6c946961a1c0f6afb0776f14.dll,#12⤵
- Blocklisted process makes network request
PID:2112
-