Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 01:55
Behavioral task
behavioral1
Sample
b3a9cd4948676656104fa3119837f29d3267f571bfff83aeb71f59a25e9a0cce.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b3a9cd4948676656104fa3119837f29d3267f571bfff83aeb71f59a25e9a0cce.dll
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
b3a9cd4948676656104fa3119837f29d3267f571bfff83aeb71f59a25e9a0cce.dll
-
Size
899KB
-
MD5
975aa18dd6256614eab856736fc6deb7
-
SHA1
1a2895d47580670b00d0863921433df5ddf4ab1b
-
SHA256
b3a9cd4948676656104fa3119837f29d3267f571bfff83aeb71f59a25e9a0cce
-
SHA512
a5ae4f8decf92cf49bdcfe8f07b00709dc3be0de773e5148d21372d21f46afb32e4653468cd6af9c2175fc00c9a76d6ef1cb27e761faf122424b476ece753d63
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXy:7wqd87Vy
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2160 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2160 2480 rundll32.exe 85 PID 2480 wrote to memory of 2160 2480 rundll32.exe 85 PID 2480 wrote to memory of 2160 2480 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3a9cd4948676656104fa3119837f29d3267f571bfff83aeb71f59a25e9a0cce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3a9cd4948676656104fa3119837f29d3267f571bfff83aeb71f59a25e9a0cce.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2160
-