Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 03:44
Behavioral task
behavioral1
Sample
05c6237cd7d9ecd28affbac5d83f4213e02ef42c17fa58ba2f2e27cd7bd900f6.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
05c6237cd7d9ecd28affbac5d83f4213e02ef42c17fa58ba2f2e27cd7bd900f6.dll
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
05c6237cd7d9ecd28affbac5d83f4213e02ef42c17fa58ba2f2e27cd7bd900f6.dll
-
Size
899KB
-
MD5
eeda52e438ed18e8df7878bb2f19f418
-
SHA1
60c51066f6341e23d06e2b587e1b6437fa1e5305
-
SHA256
05c6237cd7d9ecd28affbac5d83f4213e02ef42c17fa58ba2f2e27cd7bd900f6
-
SHA512
0ed9ebffc36ee33acfc5c4e1a42848d34e9a812e6e5dc8e44cf3c11b6e2ae1f00aaee9c9b722663659bb2f36cd96c448f4a47326b3e2fa76da09545e33d0c385
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX0:7wqd87V0
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1080 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1080 1448 rundll32.exe 28 PID 1448 wrote to memory of 1080 1448 rundll32.exe 28 PID 1448 wrote to memory of 1080 1448 rundll32.exe 28 PID 1448 wrote to memory of 1080 1448 rundll32.exe 28 PID 1448 wrote to memory of 1080 1448 rundll32.exe 28 PID 1448 wrote to memory of 1080 1448 rundll32.exe 28 PID 1448 wrote to memory of 1080 1448 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05c6237cd7d9ecd28affbac5d83f4213e02ef42c17fa58ba2f2e27cd7bd900f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05c6237cd7d9ecd28affbac5d83f4213e02ef42c17fa58ba2f2e27cd7bd900f6.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1080
-