Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 18:08
Behavioral task
behavioral1
Sample
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll
-
Size
899KB
-
MD5
90a0128c9f2c3f17047e85c668fdce75
-
SHA1
bb517855dd1df43f8ca0bfd0a6ae47d99fd1b612
-
SHA256
313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a
-
SHA512
262346259e78de6887fc38177089e4e5f48c5ba1d9e1112cbaf24c9f9140a868adbd1f1db813364b43683e4cc53e8008f11080fb40347638e8eb3be52a0f375e
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXz:7wqd87Vz
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4020 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4020 2980 rundll32.exe 82 PID 2980 wrote to memory of 4020 2980 rundll32.exe 82 PID 2980 wrote to memory of 4020 2980 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\313d166ddc5c9debdb106536a2fcae575d1055cd503d74bfa1f060775984881a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4020
-