Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2023, 16:17
Behavioral task
behavioral1
Sample
0x00090000000155c0-88.dll
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0x00090000000155c0-88.dll
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
0x00090000000155c0-88.dll
-
Size
51KB
-
MD5
d7331d4bed4cb75fc56ff5363ff38fde
-
SHA1
effc3d11458f8ded688a41c659ef8fe88362d085
-
SHA256
07a16eb76df97dc004d8cbbd5db84106cdc84ede9b6736fc31a1ae02578522cf
-
SHA512
18429619383e9235449fd14ba7a19aa8ffef08cebbecdb4519a3332d56cf03f982817e5f69b1386e421223138ad9f29923452d812bad9a9ab2efab85e601f6d4
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLNJYH5:1dWubF3n9S91BF3fbo5JYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4728 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4728 4296 rundll32.exe 86 PID 4296 wrote to memory of 4728 4296 rundll32.exe 86 PID 4296 wrote to memory of 4728 4296 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0x00090000000155c0-88.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0x00090000000155c0-88.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4728
-