Analysis
-
max time kernel
86s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 14:31
Behavioral task
behavioral1
Sample
d6f8a5d143cf87701b07bbed9bab13fd4e89da9e10456fabfae67a7be7d256ba.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d6f8a5d143cf87701b07bbed9bab13fd4e89da9e10456fabfae67a7be7d256ba.dll
Resource
win10v2004-20230831-en
2 signatures
150 seconds
General
-
Target
d6f8a5d143cf87701b07bbed9bab13fd4e89da9e10456fabfae67a7be7d256ba.dll
-
Size
899KB
-
MD5
1c76bc59ea9b3ac589b3a3154ae6ed83
-
SHA1
d45ac0f4d6c594906d2b725c9a1e54bf0cfa01ed
-
SHA256
d6f8a5d143cf87701b07bbed9bab13fd4e89da9e10456fabfae67a7be7d256ba
-
SHA512
dd1af5cbe5d0a1efb75652e195def19ff21aa8c6187983e8a56f80525fb0eb4bc39eb4127aaa712a3ff89c7d97927ef193387ec46a322626b5891b07fa6853b6
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXl:7wqd87Vl
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4192 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4192 4440 rundll32.exe 84 PID 4440 wrote to memory of 4192 4440 rundll32.exe 84 PID 4440 wrote to memory of 4192 4440 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6f8a5d143cf87701b07bbed9bab13fd4e89da9e10456fabfae67a7be7d256ba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6f8a5d143cf87701b07bbed9bab13fd4e89da9e10456fabfae67a7be7d256ba.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4192
-