Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 11:20
Behavioral task
behavioral1
Sample
7219aae14ed4db10253b067351cdab18.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7219aae14ed4db10253b067351cdab18.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7219aae14ed4db10253b067351cdab18.dll
-
Size
40KB
-
MD5
7219aae14ed4db10253b067351cdab18
-
SHA1
f6c31fb04f9c962f1691f704845b6f1f4c202afc
-
SHA256
fa0c5b8576ba9d9b9cd56c29e7814d3ed940a422cbb7155f303b519d26c2a9ac
-
SHA512
35173f4cd4bdd90a903b552b6dd0285d3dd4c0714358302f0dfb7197ed35f96b3ddc707b0e88a84c96c0bfb342eda5c0005bba5648b68cccdc1d2e4b8ae7fa42
-
SSDEEP
768:xqoKKXYeKptdrX/dYczLnbeww+42HuD/GAPVQQH6DDwArh:4oKcYeatJX/dHvnbeI5uCAdQQaPwAl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2188-0-0x0000000010000000-0x000000001001D000-memory.dmp upx behavioral1/memory/2188-1-0x0000000010000000-0x000000001001D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2188 1280 rundll32.exe 28 PID 1280 wrote to memory of 2188 1280 rundll32.exe 28 PID 1280 wrote to memory of 2188 1280 rundll32.exe 28 PID 1280 wrote to memory of 2188 1280 rundll32.exe 28 PID 1280 wrote to memory of 2188 1280 rundll32.exe 28 PID 1280 wrote to memory of 2188 1280 rundll32.exe 28 PID 1280 wrote to memory of 2188 1280 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7219aae14ed4db10253b067351cdab18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7219aae14ed4db10253b067351cdab18.dll,#12⤵PID:2188
-