Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 00:00
Behavioral task
behavioral1
Sample
3a77f0a8a54abef6c3476401477440ebe7d85c605af1221860474b287d5316ac.dll
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a77f0a8a54abef6c3476401477440ebe7d85c605af1221860474b287d5316ac.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
3a77f0a8a54abef6c3476401477440ebe7d85c605af1221860474b287d5316ac.dll
-
Size
899KB
-
MD5
0944c3b593c4eff28b132de22293c8d8
-
SHA1
18a58f31148f65b11d854859644f034780e34862
-
SHA256
3a77f0a8a54abef6c3476401477440ebe7d85c605af1221860474b287d5316ac
-
SHA512
d4f0777d27f8b007d85ef019dd90aaa700f4af524ce4c66cde554f92a35451bf208b61fa9db1c3ff1df7c37d10c6dfb3542c370ebc42041d57179fc61cd693e2
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4832 4480 rundll32.exe 86 PID 4480 wrote to memory of 4832 4480 rundll32.exe 86 PID 4480 wrote to memory of 4832 4480 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a77f0a8a54abef6c3476401477440ebe7d85c605af1221860474b287d5316ac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a77f0a8a54abef6c3476401477440ebe7d85c605af1221860474b287d5316ac.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4832
-