Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 18:37
Behavioral task
behavioral1
Sample
7538c4c56b8e6b9ebaf7c04b08d45d41.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7538c4c56b8e6b9ebaf7c04b08d45d41.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7538c4c56b8e6b9ebaf7c04b08d45d41.dll
-
Size
60KB
-
MD5
7538c4c56b8e6b9ebaf7c04b08d45d41
-
SHA1
6fc735e9499208d1a7f057cf6916b169d2e50412
-
SHA256
55f6642d0266b266bc114abca8cc094caf819cb844392138a2ec5e9ef72082c9
-
SHA512
cbcadaf0320332c0f8015cdfa144d7df7066800542d2bcf10e1e11b0f6bfcb60847298292dee3bd58e35935cf3c67cddbea08175f790f3c11b5d9d9fbd1ebff5
-
SSDEEP
768:R73xlB/LOtoioTr51Qnsjo/SkfgS29FpTPnkp4uN6sBvD17x6PvbYUds64UDUC9P:R75vr51oio09fPnkSuXQkUdsWnQy
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2724-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2724 2792 rundll32.exe 10 PID 2792 wrote to memory of 2724 2792 rundll32.exe 10 PID 2792 wrote to memory of 2724 2792 rundll32.exe 10 PID 2792 wrote to memory of 2724 2792 rundll32.exe 10 PID 2792 wrote to memory of 2724 2792 rundll32.exe 10 PID 2792 wrote to memory of 2724 2792 rundll32.exe 10 PID 2792 wrote to memory of 2724 2792 rundll32.exe 10
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7538c4c56b8e6b9ebaf7c04b08d45d41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7538c4c56b8e6b9ebaf7c04b08d45d41.dll,#12⤵PID:2724
-