Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 23:24
Behavioral task
behavioral1
Sample
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll
Resource
win7-20240215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll
Resource
win10v2004-20240426-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll
-
Size
76KB
-
MD5
147930c5952684ca8aba0510b327c8ab
-
SHA1
ba81df84fdd51652a2f9643d57263c2a72cb0196
-
SHA256
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3
-
SHA512
bf45c6065c3848e0eab128b80d3e6e39158a3249600ada3d6958c6f6034235b0dbb93f2c6356b4c729ed48372496a0762bfbaa8f7bd414d6f3dc2599c4438ccf
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZnIOjO7ef:c8y93KQjy7G55riF1cMo03NIMf
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/1288-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral1/memory/1288-2-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
resource yara_rule behavioral1/memory/1288-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1288-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1288 2320 rundll32.exe 28 PID 2320 wrote to memory of 1288 2320 rundll32.exe 28 PID 2320 wrote to memory of 1288 2320 rundll32.exe 28 PID 2320 wrote to memory of 1288 2320 rundll32.exe 28 PID 2320 wrote to memory of 1288 2320 rundll32.exe 28 PID 2320 wrote to memory of 1288 2320 rundll32.exe 28 PID 2320 wrote to memory of 1288 2320 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll,#12⤵PID:1288
-