Analysis
-
max time kernel
194s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 02:12
Behavioral task
behavioral1
Sample
8aea9c7bb64af0272be40cce4a057a5cbd3167bd9ed39f47709acd0b80c6295a.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8aea9c7bb64af0272be40cce4a057a5cbd3167bd9ed39f47709acd0b80c6295a.dll
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
8aea9c7bb64af0272be40cce4a057a5cbd3167bd9ed39f47709acd0b80c6295a.dll
-
Size
899KB
-
MD5
606429502f5572cb5f400939ff128445
-
SHA1
6cf354fe616b4a37e20934c9006da2cc580b68cb
-
SHA256
8aea9c7bb64af0272be40cce4a057a5cbd3167bd9ed39f47709acd0b80c6295a
-
SHA512
8c9a71bfc73f2314c857d9b115e6d22c04e53e4cca3682b467fc5b943c695604905704ad49ccabf823807a0594d02a751367046e75cecd23d8d838d0d5ac5ebe
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX1:7wqd87V1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4700 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4700 4392 rundll32.exe 24 PID 4392 wrote to memory of 4700 4392 rundll32.exe 24 PID 4392 wrote to memory of 4700 4392 rundll32.exe 24
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8aea9c7bb64af0272be40cce4a057a5cbd3167bd9ed39f47709acd0b80c6295a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8aea9c7bb64af0272be40cce4a057a5cbd3167bd9ed39f47709acd0b80c6295a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4700
-