Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 00:44
Behavioral task
behavioral1
Sample
b705a749873cd663be73c5e90564e882f085d6d748a9c36ef43fcaacc40477f4.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b705a749873cd663be73c5e90564e882f085d6d748a9c36ef43fcaacc40477f4.dll
-
Size
950KB
-
MD5
45674e9231a4b9fa9efd4b5cbdbc8519
-
SHA1
c453d96e1c3c34c91e6bb4b04522638083bb6386
-
SHA256
b705a749873cd663be73c5e90564e882f085d6d748a9c36ef43fcaacc40477f4
-
SHA512
04972fcf6cce83fc2d000493d151909246220bc0b857fa196e15af14164fcd8139bf5f9e0d193058ea1f51a0ef263d0d951ea897ef93ad6a4cb25d47498da64e
-
SSDEEP
1536:qGDOFSxjmiBu1Os57IXLUxUX0uX+u8Dj7XE+40b0vwjb87uGl0xQsr:lqFSxjolNmzX0Xu8vAn204jb+uHxQsr
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule behavioral1/memory/2828-0-0x0000000010000000-0x0000000010025000-memory.dmp UPX -
resource yara_rule behavioral1/memory/2828-0-0x0000000010000000-0x0000000010025000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2828 2500 rundll32.exe 28 PID 2500 wrote to memory of 2828 2500 rundll32.exe 28 PID 2500 wrote to memory of 2828 2500 rundll32.exe 28 PID 2500 wrote to memory of 2828 2500 rundll32.exe 28 PID 2500 wrote to memory of 2828 2500 rundll32.exe 28 PID 2500 wrote to memory of 2828 2500 rundll32.exe 28 PID 2500 wrote to memory of 2828 2500 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b705a749873cd663be73c5e90564e882f085d6d748a9c36ef43fcaacc40477f4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b705a749873cd663be73c5e90564e882f085d6d748a9c36ef43fcaacc40477f4.dll,#12⤵PID:2828
-