Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 04:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
66a57c1bde95ead05edd545a93b20b82.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
66a57c1bde95ead05edd545a93b20b82.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
66a57c1bde95ead05edd545a93b20b82.dll
-
Size
165KB
-
MD5
66a57c1bde95ead05edd545a93b20b82
-
SHA1
83c7c080e39ca111dd2330453a8574bb8ef8ddad
-
SHA256
6811f3e4203f27c5375bf5b9ccbf672bc1d1810e4ffd824036cec6530b33cac7
-
SHA512
b3ba437da9d891e6c6183d93dd3c0799ae5ed257d1d63ce63ac3a1015a762386ea23552e66019664c05d8e44cfa2e5c06ec106821502724b9ec3e7519d872140
-
SSDEEP
3072:gc0W+mUr6g7B9VaeG1SXahLuGbUpM1g4FAWQpsbsSOOkI:gc0WEmg7bVaAOLRI4OWCsr
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2960 rundll32.exe 2960 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2960 4476 rundll32.exe 86 PID 4476 wrote to memory of 2960 4476 rundll32.exe 86 PID 4476 wrote to memory of 2960 4476 rundll32.exe 86 PID 2960 wrote to memory of 3464 2960 rundll32.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66a57c1bde95ead05edd545a93b20b82.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66a57c1bde95ead05edd545a93b20b82.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960
-
-