Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 21:05
Static task
static1
Behavioral task
behavioral1
Sample
a07046f0cb37b5569f4f3e1ee40780156010853a89853d5a9a6e1cb5035ccb72.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a07046f0cb37b5569f4f3e1ee40780156010853a89853d5a9a6e1cb5035ccb72.dll
Resource
win10v2004-20230915-en
General
-
Target
a07046f0cb37b5569f4f3e1ee40780156010853a89853d5a9a6e1cb5035ccb72.dll
-
Size
51KB
-
MD5
215d63987b89116c8c10c2be21a3e40c
-
SHA1
42cbe1e8b2100f0fddac7ec5d8ad8b1f12a6f3e5
-
SHA256
a07046f0cb37b5569f4f3e1ee40780156010853a89853d5a9a6e1cb5035ccb72
-
SHA512
1abf8587c0dd3a44ce9c28e2d02bb0a5972c8dc46c21202ee895ab4c449ae5e61ac5a5217834d3a8398b1c07261667bfcdc46ae6b2f20cf181e64978af5cc94d
-
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBez8sAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOB7pMC6H
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4228 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4228 3936 rundll32.exe 85 PID 3936 wrote to memory of 4228 3936 rundll32.exe 85 PID 3936 wrote to memory of 4228 3936 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a07046f0cb37b5569f4f3e1ee40780156010853a89853d5a9a6e1cb5035ccb72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a07046f0cb37b5569f4f3e1ee40780156010853a89853d5a9a6e1cb5035ccb72.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4228
-