Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 22:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c1ca5bfe142f21095288206c315fe4dd.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1ca5bfe142f21095288206c315fe4dd.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
c1ca5bfe142f21095288206c315fe4dd.dll
-
Size
40KB
-
MD5
c1ca5bfe142f21095288206c315fe4dd
-
SHA1
fd329ccc4dbb980c5aaf8d2f49edeefcb0f17a2f
-
SHA256
674056b3b908eec71e777c03770eef0c27f46aef42db183ca04281f0bba43fd4
-
SHA512
9f9d06e8d9e6f44c73c176ced8b118abff6affff5b4318e742f00e061ab4e0f80f146ba511b155ffe02ce73a8fe04f53f6d851bc38bee7f6afcc3dc6b65a073a
-
SSDEEP
768:IN5HfN7M7u0/NiqjlKB/7rJLIJHh7dHWMyna5ms:IDN460/Niqjla/nVA78xa5ms
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Emotifinosobuz = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\c1ca5bfe142f21095288206c315fe4dd.dll\",e" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 3540 3144 rundll32.exe 90 PID 3144 wrote to memory of 3540 3144 rundll32.exe 90 PID 3144 wrote to memory of 3540 3144 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1ca5bfe142f21095288206c315fe4dd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1ca5bfe142f21095288206c315fe4dd.dll,#12⤵
- Adds Run key to start application
PID:3540
-