Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 00:50
Behavioral task
behavioral1
Sample
e2b980a9713271680cadc6954ce6aaa6ea434d4d0596ec5c944518757157b21a.dll
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e2b980a9713271680cadc6954ce6aaa6ea434d4d0596ec5c944518757157b21a.dll
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
e2b980a9713271680cadc6954ce6aaa6ea434d4d0596ec5c944518757157b21a.dll
-
Size
51KB
-
MD5
dc16ebc60cb1e62b2d8f24d651097039
-
SHA1
30fee3d0480116ca0105fc24f1d6d93208803515
-
SHA256
e2b980a9713271680cadc6954ce6aaa6ea434d4d0596ec5c944518757157b21a
-
SHA512
934d200287bd9ba86e216472b2773c2e451d63f6dcc0cb36f3ddbf9f0c6fe99288549a745680b1e6668af1c58e4b158be2b4a3380a565917ddc3ecebb82fe7f0
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLWJYH5:1dWubF3n9S91BF3fboaJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1148 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1148 1208 rundll32.exe 28 PID 1208 wrote to memory of 1148 1208 rundll32.exe 28 PID 1208 wrote to memory of 1148 1208 rundll32.exe 28 PID 1208 wrote to memory of 1148 1208 rundll32.exe 28 PID 1208 wrote to memory of 1148 1208 rundll32.exe 28 PID 1208 wrote to memory of 1148 1208 rundll32.exe 28 PID 1208 wrote to memory of 1148 1208 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2b980a9713271680cadc6954ce6aaa6ea434d4d0596ec5c944518757157b21a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2b980a9713271680cadc6954ce6aaa6ea434d4d0596ec5c944518757157b21a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1148
-