Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 15:27
Behavioral task
behavioral1
Sample
c04572bd3953e4473c98f23e203d67be3dd17e7444b493739ad94921be77ff47.dll
Resource
win7-20230824-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c04572bd3953e4473c98f23e203d67be3dd17e7444b493739ad94921be77ff47.dll
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
c04572bd3953e4473c98f23e203d67be3dd17e7444b493739ad94921be77ff47.dll
-
Size
899KB
-
MD5
f131a83d0666858723d016e1beb63ffa
-
SHA1
8997460d9e2ab2092ba0c6f95563a6a2e3ba7b3d
-
SHA256
c04572bd3953e4473c98f23e203d67be3dd17e7444b493739ad94921be77ff47
-
SHA512
ff380a947cbe18035892653ce9154d0f41206b0afc17a5e0ae1a1ddc0e6a70275578ea5542c55f0dc790ef936d6276f908d68672d14decb350104723bcce6861
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4448 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 492 wrote to memory of 4448 492 rundll32.exe 82 PID 492 wrote to memory of 4448 492 rundll32.exe 82 PID 492 wrote to memory of 4448 492 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c04572bd3953e4473c98f23e203d67be3dd17e7444b493739ad94921be77ff47.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c04572bd3953e4473c98f23e203d67be3dd17e7444b493739ad94921be77ff47.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4448
-