Analysis
-
max time kernel
165s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 22:44
Behavioral task
behavioral1
Sample
3e26b62fa2da5d511768fe7478384a6374519853775670e3cc967830cebf8213.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e26b62fa2da5d511768fe7478384a6374519853775670e3cc967830cebf8213.dll
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
3e26b62fa2da5d511768fe7478384a6374519853775670e3cc967830cebf8213.dll
-
Size
51KB
-
MD5
0f2f0daaea97da1ba3a13e33cb053f38
-
SHA1
6be9c8558ff0fa413312dfd7cd46976cde59c451
-
SHA256
3e26b62fa2da5d511768fe7478384a6374519853775670e3cc967830cebf8213
-
SHA512
679f694b9bba967ed827c22cf655599d3bbd1faf3aceae3cdc89e355912b106f5be152617c7f3507328c294c8c96509d4fc2e49a078883cd17d7296130318344
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLYJYH5:1dWubF3n9S91BF3fbocJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3308 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3308 1732 rundll32.exe 84 PID 1732 wrote to memory of 3308 1732 rundll32.exe 84 PID 1732 wrote to memory of 3308 1732 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e26b62fa2da5d511768fe7478384a6374519853775670e3cc967830cebf8213.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e26b62fa2da5d511768fe7478384a6374519853775670e3cc967830cebf8213.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3308
-