Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 12:08
Behavioral task
behavioral1
Sample
963c4e0f710dad8583f0594e64a5e4777f5159da0f385d817a824848accd0151.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
963c4e0f710dad8583f0594e64a5e4777f5159da0f385d817a824848accd0151.dll
Resource
win10v2004-20230831-en
2 signatures
150 seconds
General
-
Target
963c4e0f710dad8583f0594e64a5e4777f5159da0f385d817a824848accd0151.dll
-
Size
51KB
-
MD5
b20c3d03a25d476e4e7157c3370a4dcb
-
SHA1
0a9c8702581aa6f1de162133e6111862a46f542f
-
SHA256
963c4e0f710dad8583f0594e64a5e4777f5159da0f385d817a824848accd0151
-
SHA512
0563c9482af97310a345473ed635e9fc62233ba988365ac18670cbab9a64c7fec27199f81beb75e2e29707004541eb9cd2b048b669aaf5acca0c3d179dbe85f4
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL/JYH5:1dWubF3n9S91BF3fbo7JYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4864 4564 rundll32.exe 80 PID 4564 wrote to memory of 4864 4564 rundll32.exe 80 PID 4564 wrote to memory of 4864 4564 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\963c4e0f710dad8583f0594e64a5e4777f5159da0f385d817a824848accd0151.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\963c4e0f710dad8583f0594e64a5e4777f5159da0f385d817a824848accd0151.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4864
-