Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2023, 22:06
Behavioral task
behavioral1
Sample
0145654bf21b9cc085e71ab7b9001d0df1109c11c92bed030e08b6d3041b57c6.dll
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0145654bf21b9cc085e71ab7b9001d0df1109c11c92bed030e08b6d3041b57c6.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
0145654bf21b9cc085e71ab7b9001d0df1109c11c92bed030e08b6d3041b57c6.dll
-
Size
899KB
-
MD5
ca7a1ae0845496987c921cc7e21a0c69
-
SHA1
53cdb9d117881c574912020f3c12d5ca238d2329
-
SHA256
0145654bf21b9cc085e71ab7b9001d0df1109c11c92bed030e08b6d3041b57c6
-
SHA512
c6c5e319009e5338ae81cb9c3822491825a241432743a5de0f7c2b554c21dc644c1fe07d5349c941e0b37d84ed18dc8ab77fb3fbe883340bd1762348909daa9d
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX1:7wqd87V1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4276 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4276 4848 rundll32.exe 83 PID 4848 wrote to memory of 4276 4848 rundll32.exe 83 PID 4848 wrote to memory of 4276 4848 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0145654bf21b9cc085e71ab7b9001d0df1109c11c92bed030e08b6d3041b57c6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0145654bf21b9cc085e71ab7b9001d0df1109c11c92bed030e08b6d3041b57c6.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4276
-