Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 10:15
Behavioral task
behavioral1
Sample
746d87376271e1efae45be74cd253ca1.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
746d87376271e1efae45be74cd253ca1.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
746d87376271e1efae45be74cd253ca1.dll
-
Size
114KB
-
MD5
746d87376271e1efae45be74cd253ca1
-
SHA1
59015090707f668a88b5dd7cb96a1ab5edc73e15
-
SHA256
3593ae8fece7884941e98a38809e96892e7c6f9af89d7bb47decdf95ce503295
-
SHA512
42e204f845c772a59216a0bec8c1548d145519286016ed1f797cbafe53a5145c1c59fd561fddf333f8160cdc6687e7ba83484e43c238bc5ef204e3b32760ac48
-
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KviCbmN:Mpl2GkGMkSgb8Svlu5KvON
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8qme233r-2z08-y97z-bn9p-zeoifyqjk20v}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8qme233r-2z08-y97z-bn9p-zeoifyqjk20v}\stubpath = "þÿÿÿX" rundll32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8qme233r-2z08-y97z-bn9p-zeoifyqjk20v} rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2524 1620 rundll32.exe 28 PID 1620 wrote to memory of 2524 1620 rundll32.exe 28 PID 1620 wrote to memory of 2524 1620 rundll32.exe 28 PID 1620 wrote to memory of 2524 1620 rundll32.exe 28 PID 1620 wrote to memory of 2524 1620 rundll32.exe 28 PID 1620 wrote to memory of 2524 1620 rundll32.exe 28 PID 1620 wrote to memory of 2524 1620 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\746d87376271e1efae45be74cd253ca1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\746d87376271e1efae45be74cd253ca1.dll,#12⤵
- Modifies Installed Components in the registry
PID:2524
-