Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 06:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
88d3d0a035e87391f0f1080a4cc6370b.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
88d3d0a035e87391f0f1080a4cc6370b.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
88d3d0a035e87391f0f1080a4cc6370b.dll
-
Size
46KB
-
MD5
88d3d0a035e87391f0f1080a4cc6370b
-
SHA1
aaadf002334acd02fd5e607ffe64bd77226aad06
-
SHA256
948805f33eff0e21975326801b6da5e8d3602a893a42c14e29cf83a34999323c
-
SHA512
a607c60570fa7da44ef7c505baef1af50081d62634e33b070dc659c25a00eb97c76c66a1814be8e744e709de064d5b12838653d8e100deb43c83adf149a19232
-
SSDEEP
768:FS9MqvlszVyJr9x6jfZM/aMkq+DZ7+Nvka9sv8zNvBfmFv1pQbqkBEmEj:E9MqvlsRyJGfm/addDZ7QvTGvgmFGqkE
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2872 2648 rundll32.exe 28 PID 2648 wrote to memory of 2872 2648 rundll32.exe 28 PID 2648 wrote to memory of 2872 2648 rundll32.exe 28 PID 2648 wrote to memory of 2872 2648 rundll32.exe 28 PID 2648 wrote to memory of 2872 2648 rundll32.exe 28 PID 2648 wrote to memory of 2872 2648 rundll32.exe 28 PID 2648 wrote to memory of 2872 2648 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88d3d0a035e87391f0f1080a4cc6370b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88d3d0a035e87391f0f1080a4cc6370b.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-