Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 22:21
Behavioral task
behavioral1
Sample
bcf399cc216c9f7af87d4e760f538532.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
bcf399cc216c9f7af87d4e760f538532.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
bcf399cc216c9f7af87d4e760f538532.dll
-
Size
60KB
-
MD5
bcf399cc216c9f7af87d4e760f538532
-
SHA1
9d9dc1bed1a5dbcef0ae4f8e0483e9cb27edbe88
-
SHA256
812f3364d890c4194cc00f0bc0cc997a38ab3aa1f40bddf477c3ea145c2e1e5e
-
SHA512
891e91e94137f0eea14d5e7db5865476531a22b3d712e23f9bf9c7f1745aff829548d28935dc412bba189f31646801578a26d0da33badc0c4204822accacd409
-
SSDEEP
768:IykIwePd8g7dHQ+xNKpHcnJJsOQDl6w3v2C0LrXc1Dd/pORX+eLHvX69Db0:Iykzkag5x0pHc8Dlv2rrXGBBOBJa8
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3504-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3504 4732 rundll32.exe 88 PID 4732 wrote to memory of 3504 4732 rundll32.exe 88 PID 4732 wrote to memory of 3504 4732 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcf399cc216c9f7af87d4e760f538532.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcf399cc216c9f7af87d4e760f538532.dll,#12⤵PID:3504
-