Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 05:36
Behavioral task
behavioral1
Sample
c128a2d5e68a168564492122c092839853e6f491ff7d3ea27f69e3f6b08444d2.dll
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c128a2d5e68a168564492122c092839853e6f491ff7d3ea27f69e3f6b08444d2.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
c128a2d5e68a168564492122c092839853e6f491ff7d3ea27f69e3f6b08444d2.dll
-
Size
51KB
-
MD5
35ce25930f22913415d279f3b5d267ae
-
SHA1
5ad6cc1752855e1823859a1f0145795d581a454f
-
SHA256
c128a2d5e68a168564492122c092839853e6f491ff7d3ea27f69e3f6b08444d2
-
SHA512
e4d15eec1334fbf0c7aca33244e5158ccd82dd9d1cd840ba0537decb626fffcec4dfee07eb16cae75c841c0286306572a5e380f64fb9db029250009b61ba10dd
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLkJYH5:1dWubF3n9S91BF3fboQJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1472 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4204 wrote to memory of 1472 4204 rundll32.exe 87 PID 4204 wrote to memory of 1472 4204 rundll32.exe 87 PID 4204 wrote to memory of 1472 4204 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c128a2d5e68a168564492122c092839853e6f491ff7d3ea27f69e3f6b08444d2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c128a2d5e68a168564492122c092839853e6f491ff7d3ea27f69e3f6b08444d2.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1472
-