Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 01:34
Behavioral task
behavioral1
Sample
9a6e7e98041f536ef728733d9e62bf72.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
9a6e7e98041f536ef728733d9e62bf72.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
9a6e7e98041f536ef728733d9e62bf72.dll
-
Size
64KB
-
MD5
9a6e7e98041f536ef728733d9e62bf72
-
SHA1
2404edb1804f42da36e1ed588a2c5f78b1af2575
-
SHA256
0f9b925a042083a5e7f8cfe0d0e4b64fe1566e1635b680786996c48d3737c169
-
SHA512
c2dccca413d99cd0c00ce31977d5518485ad25c066578561315d0fd5720c0ed49409468c9f6bc8acd92b6d5703fe4693f1ba8eac357accaa02feb5929632c2e6
-
SSDEEP
1536:lTESkEqKtgWJvgXvV1r53GsSBz3CeSgy60hxkZGPxJg1wP:6SBKXfr53TSBz34gydvgo
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2252-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2252 4940 rundll32.exe 84 PID 4940 wrote to memory of 2252 4940 rundll32.exe 84 PID 4940 wrote to memory of 2252 4940 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a6e7e98041f536ef728733d9e62bf72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a6e7e98041f536ef728733d9e62bf72.dll,#12⤵PID:2252
-