Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 02:57
Behavioral task
behavioral1
Sample
557b65d14a76e63fa5e9c27be70f291f08de2ced183ef3f988ba6b39cc6f8009.dll
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
557b65d14a76e63fa5e9c27be70f291f08de2ced183ef3f988ba6b39cc6f8009.dll
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
557b65d14a76e63fa5e9c27be70f291f08de2ced183ef3f988ba6b39cc6f8009.dll
-
Size
899KB
-
MD5
7088989053d9db2eb3434eb03227070c
-
SHA1
71d3d09ae9adc122a10b26493b74be4d7cf594e9
-
SHA256
557b65d14a76e63fa5e9c27be70f291f08de2ced183ef3f988ba6b39cc6f8009
-
SHA512
66fa77d916bfe424a39226efc133cc0bc57b568b0e74cf315511202020cdff390c41a5d41d853da834414f7c742a3caaba20996e9d9c67b0a75a881627c77ba2
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXd:7wqd87Vd
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2192 1696 rundll32.exe 28 PID 1696 wrote to memory of 2192 1696 rundll32.exe 28 PID 1696 wrote to memory of 2192 1696 rundll32.exe 28 PID 1696 wrote to memory of 2192 1696 rundll32.exe 28 PID 1696 wrote to memory of 2192 1696 rundll32.exe 28 PID 1696 wrote to memory of 2192 1696 rundll32.exe 28 PID 1696 wrote to memory of 2192 1696 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\557b65d14a76e63fa5e9c27be70f291f08de2ced183ef3f988ba6b39cc6f8009.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\557b65d14a76e63fa5e9c27be70f291f08de2ced183ef3f988ba6b39cc6f8009.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2192
-