Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 01:40
Behavioral task
behavioral1
Sample
3f078c9cefdc06be9c7265a1ea36edae00b1847ee541c17a9237dd7abdc0b724.dll
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f078c9cefdc06be9c7265a1ea36edae00b1847ee541c17a9237dd7abdc0b724.dll
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
3f078c9cefdc06be9c7265a1ea36edae00b1847ee541c17a9237dd7abdc0b724.dll
-
Size
899KB
-
MD5
99ddb93a4312be2df7cc1a7005586e21
-
SHA1
a94a48e8fc77615a34a61118f56b38d3b4423402
-
SHA256
3f078c9cefdc06be9c7265a1ea36edae00b1847ee541c17a9237dd7abdc0b724
-
SHA512
885e90c5027d601c189ff7f97aa59740ca7845b09b45a5cec5c6f6e60c6307de0828ec9d839baf9be42d3a44ee7135100cbb72b81acbfd6d09c387a65d51d255
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1516 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 904 wrote to memory of 1516 904 rundll32.exe 28 PID 904 wrote to memory of 1516 904 rundll32.exe 28 PID 904 wrote to memory of 1516 904 rundll32.exe 28 PID 904 wrote to memory of 1516 904 rundll32.exe 28 PID 904 wrote to memory of 1516 904 rundll32.exe 28 PID 904 wrote to memory of 1516 904 rundll32.exe 28 PID 904 wrote to memory of 1516 904 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f078c9cefdc06be9c7265a1ea36edae00b1847ee541c17a9237dd7abdc0b724.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f078c9cefdc06be9c7265a1ea36edae00b1847ee541c17a9237dd7abdc0b724.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1516
-