Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2023 14:33
Behavioral task
behavioral1
Sample
8c75a478bceed4647b0cc52c641172c26af3549545dfc0ecf85f8787252fbcf1.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8c75a478bceed4647b0cc52c641172c26af3549545dfc0ecf85f8787252fbcf1.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
8c75a478bceed4647b0cc52c641172c26af3549545dfc0ecf85f8787252fbcf1.dll
-
Size
50KB
-
MD5
bf7ad8c263088d8dfdf2899a99a77756
-
SHA1
40fd7b9409271b614666986192da011254042fe8
-
SHA256
8c75a478bceed4647b0cc52c641172c26af3549545dfc0ecf85f8787252fbcf1
-
SHA512
760540789ad14ffffb781d5a16046f8bb7c13f40dde10efed1dad8cb247bd36e0ad407ddb9e003d042f039de186ad42096d23b85f7d35cf4de9bbda6ff81c71c
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5iJYH:W5ReWjTrW9rNPgYokJYH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4408 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4408 4188 rundll32.exe 85 PID 4188 wrote to memory of 4408 4188 rundll32.exe 85 PID 4188 wrote to memory of 4408 4188 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c75a478bceed4647b0cc52c641172c26af3549545dfc0ecf85f8787252fbcf1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c75a478bceed4647b0cc52c641172c26af3549545dfc0ecf85f8787252fbcf1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4408
-