Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 17:13
Behavioral task
behavioral1
Sample
99b1d80ea91ddcfb7e80ff7764c72e41.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
99b1d80ea91ddcfb7e80ff7764c72e41.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
99b1d80ea91ddcfb7e80ff7764c72e41.dll
-
Size
52KB
-
MD5
99b1d80ea91ddcfb7e80ff7764c72e41
-
SHA1
f3977e91afdceb194058ac2208776751c0fff15f
-
SHA256
55a93bc8562787b9fc57486ba928943a96ebb6720cbb6d4fa9b46e71d1f78193
-
SHA512
7d292e3840aecda774978151bb2ac901f8ab72888de1fa4569033339f9d9f7d9d0d475244acbd43e0b0bb3db29c4762295241e33494caa541b75d12a05a43221
-
SSDEEP
1536:soa1lMWiF/AN96sgi7Ar78cCvyr3HaNva5Pv:SMWi2U4fcCvyLccv
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1496-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1496 3112 rundll32.exe 66 PID 3112 wrote to memory of 1496 3112 rundll32.exe 66 PID 3112 wrote to memory of 1496 3112 rundll32.exe 66
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99b1d80ea91ddcfb7e80ff7764c72e41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99b1d80ea91ddcfb7e80ff7764c72e41.dll,#12⤵PID:1496
-