Analysis
-
max time kernel
139s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 22:11
Behavioral task
behavioral1
Sample
6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll
-
Size
49KB
-
MD5
a6f4313bb9d2e20b8879cb32ff6e9b6b
-
SHA1
48d1298c5d01498f5a46b955c3b70a16086a0895
-
SHA256
6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716
-
SHA512
dc28c5ddcdb1d3693058f384272f6884880a1f1b6cafdc11bd0cfac305faa5be8120e723dd7d65590d1c4ff550b448b39c859dc821e09ccc3d2363bd3cc0eb56
-
SSDEEP
1536:CDwMsml26T5zBj+alf1H9jfbyqkY4ZvoDUb/gJORJYHB9ElHS:Cn7zBjPp1H9ovoDa/gJCJYHBWZS
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4092 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4092 5092 rundll32.exe 79 PID 5092 wrote to memory of 4092 5092 rundll32.exe 79 PID 5092 wrote to memory of 4092 5092 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b32b5b9e2b4856cd828a8aab54cae665d537037723ad8a20ca4c5df5bb20716.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4092
-