Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2023 02:36
Behavioral task
behavioral1
Sample
18518895090907e77d8ca5182f6f4d8fdf4cc7d386401c3331bdfa25d7f7f62a.dll
Resource
win7-20231023-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
18518895090907e77d8ca5182f6f4d8fdf4cc7d386401c3331bdfa25d7f7f62a.dll
Resource
win10v2004-20231023-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
18518895090907e77d8ca5182f6f4d8fdf4cc7d386401c3331bdfa25d7f7f62a.dll
-
Size
51KB
-
MD5
1954777f9ccee9613eaf6bc698eca586
-
SHA1
eed5538c5232a455c0c615f1373d53887ab126f0
-
SHA256
18518895090907e77d8ca5182f6f4d8fdf4cc7d386401c3331bdfa25d7f7f62a
-
SHA512
ca31dd98599222591343c55ddb449bf098a1c29dc9a42c0e0090e01dd5d238ae6292321775595180eaf8ebb55a92d6cacd50b43c71313f7de1a1d23229fc0140
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLhJYH5:1dWubF3n9S91BF3fbodJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4884 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4884 4904 rundll32.exe 85 PID 4904 wrote to memory of 4884 4904 rundll32.exe 85 PID 4904 wrote to memory of 4884 4904 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18518895090907e77d8ca5182f6f4d8fdf4cc7d386401c3331bdfa25d7f7f62a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18518895090907e77d8ca5182f6f4d8fdf4cc7d386401c3331bdfa25d7f7f62a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4884
-