Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
74eafff01cf3dd8dfeae203fb1886ab5.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
74eafff01cf3dd8dfeae203fb1886ab5.dll
-
Size
48KB
-
MD5
74eafff01cf3dd8dfeae203fb1886ab5
-
SHA1
09bb1b190738d153e87cfe3d6982543673bac75e
-
SHA256
16ce233ba9093265f546965abb24d2ca17b282b72b79a32608410fac5f423636
-
SHA512
97f786fc1b758ca81eab731ba2f5e135fa96aef2826d711435909d5ae6a5560414065cada670c8d7001a5ba52b620807507fd67000120822cbd50b9c176c42f2
-
SSDEEP
768:nJkMZ8/8T84DR4gbFBkYXIWYC/nbNisoiGgqCC/:nA/6DRTFBhXn/nSilqCC
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4500 rundll32.exe 4500 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2012 wrote to memory of 4500 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 4500 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 4500 2012 rundll32.exe rundll32.exe PID 4500 wrote to memory of 3436 4500 rundll32.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74eafff01cf3dd8dfeae203fb1886ab5.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74eafff01cf3dd8dfeae203fb1886ab5.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500