Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c6ac7d24d8fcbf6373105b1750e35133.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6ac7d24d8fcbf6373105b1750e35133.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
c6ac7d24d8fcbf6373105b1750e35133.dll
-
Size
17KB
-
MD5
c6ac7d24d8fcbf6373105b1750e35133
-
SHA1
c187cfaccf17246e4d190538b4b1a35b26bdcf3e
-
SHA256
bdddec0720a7ddc9163e97425753c3ee625453339cd196b963014b161916f93d
-
SHA512
98cd6a631643f676e21666ed8cc7fb8670fdb2adeaa304842dac97524dcdabedd8a32a44120f93bb57a1d3cb1d139059c076f4ef1eb3ade2e2f66a39af1d7378
-
SSDEEP
384:Qzw0onx8cJv3W3WM/tJ1abDjbKdKm7K0Z2:QVonb3sWAif2bZ2
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sp = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\c6ac7d24d8fcbf6373105b1750e35133.dll,DllInstall" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4732 5040 rundll32.exe 88 PID 5040 wrote to memory of 4732 5040 rundll32.exe 88 PID 5040 wrote to memory of 4732 5040 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6ac7d24d8fcbf6373105b1750e35133.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6ac7d24d8fcbf6373105b1750e35133.dll,#12⤵
- Adds Run key to start application
PID:4732
-