Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2023 09:03
Behavioral task
behavioral1
Sample
ed28f49deca3372b9225394ff509360526bae182850323cf163146644099b2e0.dll
Resource
win7-20231023-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ed28f49deca3372b9225394ff509360526bae182850323cf163146644099b2e0.dll
Resource
win10v2004-20231020-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ed28f49deca3372b9225394ff509360526bae182850323cf163146644099b2e0.dll
-
Size
51KB
-
MD5
7289d9edb46d331034ca108f88ca28ed
-
SHA1
111e36e03cc4a806b5eb8bac0f1ae740a732ebd6
-
SHA256
ed28f49deca3372b9225394ff509360526bae182850323cf163146644099b2e0
-
SHA512
3f8bd7aea8721d4ba1f96eb34238f633cfa7c45c926e29f87f13349df59171a020647d5cde765b654386be152f7677a4d6d24352e6c2bd726b8d4e858dadf55d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLgJYH5:1dWubF3n9S91BF3fbokJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2400 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2400 2860 rundll32.exe 86 PID 2860 wrote to memory of 2400 2860 rundll32.exe 86 PID 2860 wrote to memory of 2400 2860 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed28f49deca3372b9225394ff509360526bae182850323cf163146644099b2e0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed28f49deca3372b9225394ff509360526bae182850323cf163146644099b2e0.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2400
-