Analysis
-
max time kernel
2s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 07:10
Behavioral task
behavioral1
Sample
bad4e2e7504f8534458a9d9dd7b1362f.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bad4e2e7504f8534458a9d9dd7b1362f.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
bad4e2e7504f8534458a9d9dd7b1362f.dll
-
Size
15KB
-
MD5
bad4e2e7504f8534458a9d9dd7b1362f
-
SHA1
1dd40be8446808cc50ac38ff2f82fb0deed19b44
-
SHA256
c7abdc5c18a0a75619b1b6f931223e019a116bd0489950a328e53411258d3072
-
SHA512
d8c8f88548b7d17b5560877e2f426d6c762ed94edd99d750767c78ae7391468dcbc73810fc168f77ed8be5290dc0c2213882ddec364b9839b896366d8d9e4418
-
SSDEEP
384:SDO9CQ5s90+e+rSzHbdO9bZ5KECRmpAPnWIT:ahU5mlMECQCPnfT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1216-0-0x0000000074E40000-0x0000000074E4E000-memory.dmp upx behavioral1/memory/1216-2-0x0000000074E40000-0x0000000074E4E000-memory.dmp upx behavioral1/memory/1216-1-0x0000000074E40000-0x0000000074E4E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1216 1408 rundll32.exe 28 PID 1408 wrote to memory of 1216 1408 rundll32.exe 28 PID 1408 wrote to memory of 1216 1408 rundll32.exe 28 PID 1408 wrote to memory of 1216 1408 rundll32.exe 28 PID 1408 wrote to memory of 1216 1408 rundll32.exe 28 PID 1408 wrote to memory of 1216 1408 rundll32.exe 28 PID 1408 wrote to memory of 1216 1408 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bad4e2e7504f8534458a9d9dd7b1362f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bad4e2e7504f8534458a9d9dd7b1362f.dll,#12⤵PID:1216
-