Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
0d76bbab312f601fd4f0b09f62b2907a6b0ae0afccb2848561e9c96a42bf290d.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0d76bbab312f601fd4f0b09f62b2907a6b0ae0afccb2848561e9c96a42bf290d.dll
Resource
win10v2004-20230831-en
General
-
Target
0d76bbab312f601fd4f0b09f62b2907a6b0ae0afccb2848561e9c96a42bf290d.dll
-
Size
167KB
-
MD5
2ffad07452b32c3cb6a5239d8eecf4eb
-
SHA1
6cb897dcaace61a39efc5045e3592c4eb90314d6
-
SHA256
0d76bbab312f601fd4f0b09f62b2907a6b0ae0afccb2848561e9c96a42bf290d
-
SHA512
a4e4cea1a63c6124a8b76d3ef82f674ed8c007626efa156b29a9a91be262814cdf1be609af0942b3b14bfad921d3636bc376ccce704c4370aed55372dd63b0fa
-
SSDEEP
3072:3mc9FWRVUKy1r1SV1W3iBBjuq3T7SSjTS+HaQF5ob+U:3RFWRVUKy1BBMBjuq3T7SuTSiWv
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 712 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 712 3420 rundll32.exe 85 PID 3420 wrote to memory of 712 3420 rundll32.exe 85 PID 3420 wrote to memory of 712 3420 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d76bbab312f601fd4f0b09f62b2907a6b0ae0afccb2848561e9c96a42bf290d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d76bbab312f601fd4f0b09f62b2907a6b0ae0afccb2848561e9c96a42bf290d.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:712
-