Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 16:40
Behavioral task
behavioral1
Sample
c3d80184cf157ed587eeb4ce91a43844.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c3d80184cf157ed587eeb4ce91a43844.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c3d80184cf157ed587eeb4ce91a43844.dll
-
Size
54KB
-
MD5
c3d80184cf157ed587eeb4ce91a43844
-
SHA1
93a9a120fe791781eebcc9a85142ff4600fb77b4
-
SHA256
d002e32786e0f12a9ce1d4c68177f6bec961199b241bd10fcd96a3ae930fb0c1
-
SHA512
10ebcbc6e131832cf8ab33047153114df03a61cb9401e285609a85d10ddf9ee8b8e3ea83335aeb28f1c74b692e41408e9f2f1b9185e521a24ac87bd02ff6d533
-
SSDEEP
1536:CjAO15+cvdLVsI/aUbY7wz7mog8kvivMpVwg4b:CjAO+cvdJsyPT7dwTVwgY
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2044-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2044 2180 rundll32.exe 28 PID 2180 wrote to memory of 2044 2180 rundll32.exe 28 PID 2180 wrote to memory of 2044 2180 rundll32.exe 28 PID 2180 wrote to memory of 2044 2180 rundll32.exe 28 PID 2180 wrote to memory of 2044 2180 rundll32.exe 28 PID 2180 wrote to memory of 2044 2180 rundll32.exe 28 PID 2180 wrote to memory of 2044 2180 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3d80184cf157ed587eeb4ce91a43844.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3d80184cf157ed587eeb4ce91a43844.dll,#12⤵PID:2044
-