Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
cb19dc931aaeb19d89cd0e754e24094f.dll
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
cb19dc931aaeb19d89cd0e754e24094f.dll
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
cb19dc931aaeb19d89cd0e754e24094f.dll
-
Size
219KB
-
MD5
cb19dc931aaeb19d89cd0e754e24094f
-
SHA1
20c194389442633135e962d0f0ad17c3a3fdaddf
-
SHA256
b8774eb7f84e745d2fd1fb0bca66eb0ef9a9b77fd72128c58209dca90f18b9fb
-
SHA512
44f3436cc6e4ba5df77fdd26e7a28170a9cab40623309a5c4ddde6375151615d68c40a262c78110aef6b485ed19ad329cba752b2a56a4c5656460782f2616f39
-
SSDEEP
3072:eO1gx2h4gjRcoZ+LZG+AJ6DfscHeVmsOqFfPE6D3fVTa:51fNeHZGF6DUcHU6qxhD3fVTa
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\f49042e457e0dc98d91beaa139cd91bc.pad rundll32.exe File opened for modification C:\PROGRA~3\f49042e457e0dc98d91beaa139cd91bc.pad rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1880 1956 rundll32.exe 28 PID 1956 wrote to memory of 1880 1956 rundll32.exe 28 PID 1956 wrote to memory of 1880 1956 rundll32.exe 28 PID 1956 wrote to memory of 1880 1956 rundll32.exe 28 PID 1956 wrote to memory of 1880 1956 rundll32.exe 28 PID 1956 wrote to memory of 1880 1956 rundll32.exe 28 PID 1956 wrote to memory of 1880 1956 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb19dc931aaeb19d89cd0e754e24094f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb19dc931aaeb19d89cd0e754e24094f.dll,#12⤵
- Drops file in Program Files directory
PID:1880
-