Analysis
-
max time kernel
169s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 19:50
Behavioral task
behavioral1
Sample
03415c263efd6cb454c270c10cf531073312a60a7f137309e4ed1b999f8bc1ba.dll
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
03415c263efd6cb454c270c10cf531073312a60a7f137309e4ed1b999f8bc1ba.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
03415c263efd6cb454c270c10cf531073312a60a7f137309e4ed1b999f8bc1ba.dll
-
Size
50KB
-
MD5
10e4dc50431976258bdc58a90b3839c2
-
SHA1
6e130acd4831d22bf0730de35d44fb9ab460fe7c
-
SHA256
03415c263efd6cb454c270c10cf531073312a60a7f137309e4ed1b999f8bc1ba
-
SHA512
51a2cdb146d0d6f4a1bb1e96217de0211319d5bc985e58662d38f5a56303223bb561658e8a3d1c64acc3a125ea2661e5813d4361f804453ff2f5b85b06f1d14e
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5cJYH:W5ReWjTrW9rNPgYoWJYH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 768 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 768 4188 rundll32.exe 86 PID 4188 wrote to memory of 768 4188 rundll32.exe 86 PID 4188 wrote to memory of 768 4188 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03415c263efd6cb454c270c10cf531073312a60a7f137309e4ed1b999f8bc1ba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03415c263efd6cb454c270c10cf531073312a60a7f137309e4ed1b999f8bc1ba.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:768
-