Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 04:20
Behavioral task
behavioral1
Sample
2a8cd8f880408c00de5d9e0ce41d4fea9a10e6f248d286b05b2f43d251cb11f3.dll
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a8cd8f880408c00de5d9e0ce41d4fea9a10e6f248d286b05b2f43d251cb11f3.dll
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
2a8cd8f880408c00de5d9e0ce41d4fea9a10e6f248d286b05b2f43d251cb11f3.dll
-
Size
899KB
-
MD5
482ca1c2fd65306a4bef6bd8330f2113
-
SHA1
b489fa24030b020d33e8cff76f946b2cb4df7e15
-
SHA256
2a8cd8f880408c00de5d9e0ce41d4fea9a10e6f248d286b05b2f43d251cb11f3
-
SHA512
3b3d766e0a0e34cb85f7a9fd700fe0d0cfa8992e7464059a0976fc7484d762b93dfa88c55f44790c3c7ac854f3239f4ee88e9310aa692d2e057219af99fd5d0f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXO:7wqd87VO
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2860 4604 rundll32.exe 81 PID 4604 wrote to memory of 2860 4604 rundll32.exe 81 PID 4604 wrote to memory of 2860 4604 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a8cd8f880408c00de5d9e0ce41d4fea9a10e6f248d286b05b2f43d251cb11f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a8cd8f880408c00de5d9e0ce41d4fea9a10e6f248d286b05b2f43d251cb11f3.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2860
-