Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-08-2023 23:13
Behavioral task
behavioral1
Sample
7ad11d06d437ba23667ac37e67b785468007399549a5c8950156f31501412f93.dll
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ad11d06d437ba23667ac37e67b785468007399549a5c8950156f31501412f93.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7ad11d06d437ba23667ac37e67b785468007399549a5c8950156f31501412f93.dll
-
Size
51KB
-
MD5
6fb3ea3d66ed7193b08a9cccba7cab87
-
SHA1
bc8003024b77658134a8a64c9ca2b8a2219f72eb
-
SHA256
7ad11d06d437ba23667ac37e67b785468007399549a5c8950156f31501412f93
-
SHA512
4bc0e6b56f6edcb532d06e60741ecfe968ef5118922a58136f410337dd066664bcd987b31bf76583d4ad3c3282519559e030682fe2f8e2c2af636055ce126704
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLNJYH5:1dWubF3n9S91BF3fboZJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2780 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2780 2300 rundll32.exe 28 PID 2300 wrote to memory of 2780 2300 rundll32.exe 28 PID 2300 wrote to memory of 2780 2300 rundll32.exe 28 PID 2300 wrote to memory of 2780 2300 rundll32.exe 28 PID 2300 wrote to memory of 2780 2300 rundll32.exe 28 PID 2300 wrote to memory of 2780 2300 rundll32.exe 28 PID 2300 wrote to memory of 2780 2300 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ad11d06d437ba23667ac37e67b785468007399549a5c8950156f31501412f93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ad11d06d437ba23667ac37e67b785468007399549a5c8950156f31501412f93.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2780
-