Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 00:48
Behavioral task
behavioral1
Sample
c1c6df1f305bba5373deed173dcf19be7fdd9dcc8a11a50d535a0f108a222b41.dll
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1c6df1f305bba5373deed173dcf19be7fdd9dcc8a11a50d535a0f108a222b41.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c1c6df1f305bba5373deed173dcf19be7fdd9dcc8a11a50d535a0f108a222b41.dll
-
Size
51KB
-
MD5
04d3fea14f1495070c5607786507450b
-
SHA1
a649ff4911cb980024b22663dc897a8b2709bcca
-
SHA256
c1c6df1f305bba5373deed173dcf19be7fdd9dcc8a11a50d535a0f108a222b41
-
SHA512
f5b79d0a2a836d474f8e628ea1a48824a180ee062909d43f23a7a5387aee7b6ef38cbf7c7f5acf90fe18e966b9f64efa46c9885009a5482c0bd233d090c08bfa
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL6JYH5:1dWubF3n9S91BF3fbo+JYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4328 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4328 2920 rundll32.exe 80 PID 2920 wrote to memory of 4328 2920 rundll32.exe 80 PID 2920 wrote to memory of 4328 2920 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1c6df1f305bba5373deed173dcf19be7fdd9dcc8a11a50d535a0f108a222b41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1c6df1f305bba5373deed173dcf19be7fdd9dcc8a11a50d535a0f108a222b41.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4328
-