Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2023 04:43
Behavioral task
behavioral1
Sample
616cfac4996d739961e456a45aa587bf3420958ac78b3bf7e856cdc5fc22eddb.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
616cfac4996d739961e456a45aa587bf3420958ac78b3bf7e856cdc5fc22eddb.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
616cfac4996d739961e456a45aa587bf3420958ac78b3bf7e856cdc5fc22eddb.dll
-
Size
51KB
-
MD5
b4b28c61fa03e957563c44b39d588325
-
SHA1
fc032e047fad07999c8a13fcff38d5a08815ecf2
-
SHA256
616cfac4996d739961e456a45aa587bf3420958ac78b3bf7e856cdc5fc22eddb
-
SHA512
9e75215516db391b320180694b62181e12e8996dd526b7d3c68cb29c23365e6752fc5c7efac0d79c4ab0e403b78101e81dd2b32db6cf83195c9db69695ba2281
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLRJYH5:1dWubF3n9S91BF3fbotJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4920 2812 rundll32.exe 71 PID 2812 wrote to memory of 4920 2812 rundll32.exe 71 PID 2812 wrote to memory of 4920 2812 rundll32.exe 71
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\616cfac4996d739961e456a45aa587bf3420958ac78b3bf7e856cdc5fc22eddb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\616cfac4996d739961e456a45aa587bf3420958ac78b3bf7e856cdc5fc22eddb.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4920
-