Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 22:44
Behavioral task
behavioral1
Sample
789614870b7bfbb45f7b351825daf047.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
789614870b7bfbb45f7b351825daf047.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
789614870b7bfbb45f7b351825daf047.dll
-
Size
60KB
-
MD5
789614870b7bfbb45f7b351825daf047
-
SHA1
a35557b2cfe68ed43270424da91f42d793db52aa
-
SHA256
7a1328de78d2578450a1a3c30c90e7c43ac7b72518ad3ef71835b1449a982120
-
SHA512
8e8d6ee25e18d1ab993a2b6a0e4c7b52c88ecd6b87b4ee346762ddead0963494a2d888df53e2e63da04e8820405971aff81482d13f080b297d97de38bb9a688a
-
SSDEEP
768:DVV27Pk2b+S9zwj3gVl4f9/yGJ9DWUGEMjQv9LzJVeKgSLavjCRHDN1EiskWnKP:DVV1HTO2VyGJ928v9Lfew+riD/inE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4172-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4172 2176 rundll32.exe 86 PID 2176 wrote to memory of 4172 2176 rundll32.exe 86 PID 2176 wrote to memory of 4172 2176 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\789614870b7bfbb45f7b351825daf047.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\789614870b7bfbb45f7b351825daf047.dll,#12⤵PID:4172
-