Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 11:57
Behavioral task
behavioral1
Sample
5373f3b4c0a07da78cf5c285652bed7d.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5373f3b4c0a07da78cf5c285652bed7d.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
5373f3b4c0a07da78cf5c285652bed7d.dll
-
Size
275KB
-
MD5
5373f3b4c0a07da78cf5c285652bed7d
-
SHA1
ca41576c495b1b320935fce3c8966d5ebaa22458
-
SHA256
be2de7e66ab2f51cd99d915fca23b1253dd5da6c71dc4438aef26b1e55ae2f6d
-
SHA512
4305d4348a9286470d79908be3a1575332064dadd96550aa3bfca8cceba43584142b6e7d1348510487ecd45b5e6d07265a49010fc5e3ffa9ede1e0fd39933848
-
SSDEEP
6144:u2aF3jLlk3V2RcGtVqbt4bNSoar1fR8Ky97EoSn:ulRcGtVqcUpEeoSn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1104-0-0x0000000010000000-0x00000000100A1000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1104 1520 rundll32.exe 17 PID 1520 wrote to memory of 1104 1520 rundll32.exe 17 PID 1520 wrote to memory of 1104 1520 rundll32.exe 17 PID 1520 wrote to memory of 1104 1520 rundll32.exe 17 PID 1520 wrote to memory of 1104 1520 rundll32.exe 17 PID 1520 wrote to memory of 1104 1520 rundll32.exe 17 PID 1520 wrote to memory of 1104 1520 rundll32.exe 17
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5373f3b4c0a07da78cf5c285652bed7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5373f3b4c0a07da78cf5c285652bed7d.dll,#12⤵PID:1104
-