Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 06:13
Static task
static1
Behavioral task
behavioral1
Sample
dc61aa37777510485b419aec4b9a7e1ae989c7eadf6440d267046316e54e3500.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dc61aa37777510485b419aec4b9a7e1ae989c7eadf6440d267046316e54e3500.dll
Resource
win10v2004-20230915-en
General
-
Target
dc61aa37777510485b419aec4b9a7e1ae989c7eadf6440d267046316e54e3500.dll
-
Size
51KB
-
MD5
3321cb42502c37576187cb413952576e
-
SHA1
a19da6e11a8ea507d428b7c59c7f6ec0c925dd15
-
SHA256
dc61aa37777510485b419aec4b9a7e1ae989c7eadf6440d267046316e54e3500
-
SHA512
70e5b5746aebc433c02aeee4455e38e9d9aec084fa3d4574e63026b1968410be58cea1672ff7b8b5d35ff47d4d825f6c65f16e2b89214c0e38e93bf9b34d6828
-
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBez5sAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBupMC6H
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4764 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4764 4748 rundll32.exe 84 PID 4748 wrote to memory of 4764 4748 rundll32.exe 84 PID 4748 wrote to memory of 4764 4748 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc61aa37777510485b419aec4b9a7e1ae989c7eadf6440d267046316e54e3500.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc61aa37777510485b419aec4b9a7e1ae989c7eadf6440d267046316e54e3500.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4764
-