Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 12:32
Behavioral task
behavioral1
Sample
81471ff84d36b42d40ebe0c4726647d53990d10f38fca5382ac7e6e4c2541ef1.dll
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
81471ff84d36b42d40ebe0c4726647d53990d10f38fca5382ac7e6e4c2541ef1.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
81471ff84d36b42d40ebe0c4726647d53990d10f38fca5382ac7e6e4c2541ef1.dll
-
Size
899KB
-
MD5
03d6df3cee3ae783617f4ea0bfbe8805
-
SHA1
50b5c8bbcca92a1216ffaf281022cea6dac0e363
-
SHA256
81471ff84d36b42d40ebe0c4726647d53990d10f38fca5382ac7e6e4c2541ef1
-
SHA512
932f73c0b8bca0e87d10447cd76352cb91c9fa952f1e484fa27b512b888abd369e214f6f3411f80a9f2be4edbddf6a004d7e1313880b2b67935f8356a05a0d22
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXN:7wqd87VN
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 704 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4452 wrote to memory of 704 4452 rundll32.exe 81 PID 4452 wrote to memory of 704 4452 rundll32.exe 81 PID 4452 wrote to memory of 704 4452 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81471ff84d36b42d40ebe0c4726647d53990d10f38fca5382ac7e6e4c2541ef1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81471ff84d36b42d40ebe0c4726647d53990d10f38fca5382ac7e6e4c2541ef1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:704
-