Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 00:44
Behavioral task
behavioral1
Sample
7eea7c0aa07e86b46770a3d5ab8e7bb6dbd3fd4e1f1e8c4df7370e74861e8f71.dll
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7eea7c0aa07e86b46770a3d5ab8e7bb6dbd3fd4e1f1e8c4df7370e74861e8f71.dll
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
7eea7c0aa07e86b46770a3d5ab8e7bb6dbd3fd4e1f1e8c4df7370e74861e8f71.dll
-
Size
50KB
-
MD5
cff96987c3886cca73f051faa5471d64
-
SHA1
c6f6e171382fbe768034e70fed64e6f55b9f6ef4
-
SHA256
7eea7c0aa07e86b46770a3d5ab8e7bb6dbd3fd4e1f1e8c4df7370e74861e8f71
-
SHA512
1add250100918d26e593c47ae1d4fc3c79acb0a9f16a38b6f9a0a92868928f84c095b394f22466640dfb703901279bd5f5785d6261f879d8a4a93b7cd6adfe24
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5YJYH:W5ReWjTrW9rNPgYo2JYH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3012 2808 rundll32.exe 81 PID 2808 wrote to memory of 3012 2808 rundll32.exe 81 PID 2808 wrote to memory of 3012 2808 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eea7c0aa07e86b46770a3d5ab8e7bb6dbd3fd4e1f1e8c4df7370e74861e8f71.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eea7c0aa07e86b46770a3d5ab8e7bb6dbd3fd4e1f1e8c4df7370e74861e8f71.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3012
-