Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 02:00
Behavioral task
behavioral1
Sample
8defef5fb093c40c5f585f25fde85e97.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8defef5fb093c40c5f585f25fde85e97.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
8defef5fb093c40c5f585f25fde85e97.dll
-
Size
98KB
-
MD5
8defef5fb093c40c5f585f25fde85e97
-
SHA1
645cb990907e7a20722e390032271b1294da8cbe
-
SHA256
534a2360786ab49a6e58eab3efd1379bb435d74f2868148c89100dadde607319
-
SHA512
71c1dba3bd50ed7eb06a41b1501fad26e49323898b4ea68c50279a0b76b895446e8cd9396f72f8c3b0d7af922888d810b5b962e6b833ff876ccabd096d707549
-
SSDEEP
3072:z1QT0hvKOW4cVLLePlKWhWhOyTz50Li98:z1fQOWfNWVgTqQ8
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2096-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4912 wrote to memory of 2096 4912 rundll32.exe 84 PID 4912 wrote to memory of 2096 4912 rundll32.exe 84 PID 4912 wrote to memory of 2096 4912 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8defef5fb093c40c5f585f25fde85e97.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8defef5fb093c40c5f585f25fde85e97.dll,#12⤵PID:2096
-