Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
Consignment Document PL&BL Draft.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Consignment Document PL&BL Draft.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
yrcvb.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
yrcvb.dll
Resource
win10v2004-20240508-en
General
-
Target
yrcvb.dll
-
Size
11KB
-
MD5
8d80a618809cc8ce5970b0839f0e2b5a
-
SHA1
34af09ca5aa646debe4d2bd06fd5b3c3b7a43b09
-
SHA256
f4163107f632e0b431c38652eb297733f4f01d37576100673a47370da9221159
-
SHA512
21bfab7002044c7b33d99de355b49357ae5c45c8781ae080a906c091621ab55e39444e3ecfe04345022ab214dd50f38df0387a3386e0442312cc614bc8b397bf
-
SSDEEP
192:s6/In3h0bUe1nJBmKESoXIIbzuStOiKazVWGUwkcU:s6ax0B1nJBbxojuStORazsV
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid Process 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 616 wrote to memory of 1940 616 rundll32.exe 28 PID 616 wrote to memory of 1940 616 rundll32.exe 28 PID 616 wrote to memory of 1940 616 rundll32.exe 28 PID 616 wrote to memory of 1940 616 rundll32.exe 28 PID 616 wrote to memory of 1940 616 rundll32.exe 28 PID 616 wrote to memory of 1940 616 rundll32.exe 28 PID 616 wrote to memory of 1940 616 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yrcvb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yrcvb.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-