Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 02:00
Behavioral task
behavioral1
Sample
0379ee172f4e066fa38969c236baad089b78872930134295fca47860d849dc4d.dll
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0379ee172f4e066fa38969c236baad089b78872930134295fca47860d849dc4d.dll
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0379ee172f4e066fa38969c236baad089b78872930134295fca47860d849dc4d.dll
-
Size
899KB
-
MD5
4d8478e952da91d3b193531a75aaba54
-
SHA1
67a08f0894bf6d5980b0fe29a9c305fcdbbd4355
-
SHA256
0379ee172f4e066fa38969c236baad089b78872930134295fca47860d849dc4d
-
SHA512
fa6b1552e6810659bb37fd89736f15665c5767a7d7dc2b09b1b9709e0c2741b067dad4f26ec15553a99f532740585a37128c3685901872bc780fe181b14b7252
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXW:7wqd87VW
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1264 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3892 wrote to memory of 1264 3892 rundll32.exe 82 PID 3892 wrote to memory of 1264 3892 rundll32.exe 82 PID 3892 wrote to memory of 1264 3892 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0379ee172f4e066fa38969c236baad089b78872930134295fca47860d849dc4d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0379ee172f4e066fa38969c236baad089b78872930134295fca47860d849dc4d.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1264
-