Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
21/11/2023, 00:34
Behavioral task
behavioral1
Sample
a4dfd9e83cc72dbc8121c2adacd708acd61377e2e8746bb1237bd3aedd61c262.dll
Resource
win7-20231025-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a4dfd9e83cc72dbc8121c2adacd708acd61377e2e8746bb1237bd3aedd61c262.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
a4dfd9e83cc72dbc8121c2adacd708acd61377e2e8746bb1237bd3aedd61c262.dll
-
Size
899KB
-
MD5
083d68f877bc0c09dab8821f9e7a23bf
-
SHA1
b0fcd4348612ac9061ad81b3a93a74592a8f1e40
-
SHA256
a4dfd9e83cc72dbc8121c2adacd708acd61377e2e8746bb1237bd3aedd61c262
-
SHA512
aa74714cf47047bc44a3eee01adc15422a77604f8d355e0b2b86fa7f361305c3a2b112c0edd505fd9107f48043d3835521160b646483190fa1bc5e33c297a935
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX4:7wqd87V4
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2140 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2140 2220 rundll32.exe 28 PID 2220 wrote to memory of 2140 2220 rundll32.exe 28 PID 2220 wrote to memory of 2140 2220 rundll32.exe 28 PID 2220 wrote to memory of 2140 2220 rundll32.exe 28 PID 2220 wrote to memory of 2140 2220 rundll32.exe 28 PID 2220 wrote to memory of 2140 2220 rundll32.exe 28 PID 2220 wrote to memory of 2140 2220 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4dfd9e83cc72dbc8121c2adacd708acd61377e2e8746bb1237bd3aedd61c262.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4dfd9e83cc72dbc8121c2adacd708acd61377e2e8746bb1237bd3aedd61c262.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2140
-