Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 11:20
Behavioral task
behavioral1
Sample
7219aae14ed4db10253b067351cdab18.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7219aae14ed4db10253b067351cdab18.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7219aae14ed4db10253b067351cdab18.dll
-
Size
40KB
-
MD5
7219aae14ed4db10253b067351cdab18
-
SHA1
f6c31fb04f9c962f1691f704845b6f1f4c202afc
-
SHA256
fa0c5b8576ba9d9b9cd56c29e7814d3ed940a422cbb7155f303b519d26c2a9ac
-
SHA512
35173f4cd4bdd90a903b552b6dd0285d3dd4c0714358302f0dfb7197ed35f96b3ddc707b0e88a84c96c0bfb342eda5c0005bba5648b68cccdc1d2e4b8ae7fa42
-
SSDEEP
768:xqoKKXYeKptdrX/dYczLnbeww+42HuD/GAPVQQH6DDwArh:4oKcYeatJX/dHvnbeI5uCAdQQaPwAl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2668-0-0x0000000010000000-0x000000001001D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2668 1748 rundll32.exe 85 PID 1748 wrote to memory of 2668 1748 rundll32.exe 85 PID 1748 wrote to memory of 2668 1748 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7219aae14ed4db10253b067351cdab18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7219aae14ed4db10253b067351cdab18.dll,#12⤵PID:2668
-