Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 09:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53348065ccbb6627b747a6159c4468eb.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
53348065ccbb6627b747a6159c4468eb.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
53348065ccbb6627b747a6159c4468eb.dll
-
Size
272KB
-
MD5
53348065ccbb6627b747a6159c4468eb
-
SHA1
28b53374e843719735d68b2b681073b0d36e7305
-
SHA256
e5719e76e2525dccab32080409760c09c0826e897cbbc32e0c35adb3fceeab6b
-
SHA512
1bfb477739b11fee2c71c95bff69b781a8a0c6068f7b89ca4109275b966fd81bd7bd0a5d2a56112ab83661c9a38534875f4d8a1238789a76ff940c67bfff12ba
-
SSDEEP
6144:kU6BMmACRSn6qLjMyZFCoa0T7/cLpzOjAmP5Eo4cU:kU6emAeeMy3/4OzR
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Mpalidet = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\53348065ccbb6627b747a6159c4468eb.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2720 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2720 2448 rundll32.exe 28 PID 2448 wrote to memory of 2720 2448 rundll32.exe 28 PID 2448 wrote to memory of 2720 2448 rundll32.exe 28 PID 2448 wrote to memory of 2720 2448 rundll32.exe 28 PID 2448 wrote to memory of 2720 2448 rundll32.exe 28 PID 2448 wrote to memory of 2720 2448 rundll32.exe 28 PID 2448 wrote to memory of 2720 2448 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53348065ccbb6627b747a6159c4468eb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53348065ccbb6627b747a6159c4468eb.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720
-