Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 18:08
Behavioral task
behavioral1
Sample
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll
-
Size
899KB
-
MD5
90a0128c9f2c3f17047e85c668fdce75
-
SHA1
bb517855dd1df43f8ca0bfd0a6ae47d99fd1b612
-
SHA256
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a
-
SHA512
262346259e78de6887fc38177089e4e5f48c5ba1d9e1112cbaf24c9f9140a868adbd1f1db813364b43683e4cc53e8008f11080fb40347638e8eb3be52a0f375e
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXz:7wqd87Vz
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2196 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2196 1616 rundll32.exe 28 PID 1616 wrote to memory of 2196 1616 rundll32.exe 28 PID 1616 wrote to memory of 2196 1616 rundll32.exe 28 PID 1616 wrote to memory of 2196 1616 rundll32.exe 28 PID 1616 wrote to memory of 2196 1616 rundll32.exe 28 PID 1616 wrote to memory of 2196 1616 rundll32.exe 28 PID 1616 wrote to memory of 2196 1616 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2196
-