Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2023 09:18
Static task
static1
Behavioral task
behavioral1
Sample
c36ab3be7e5ce6edb61b378d6b8625c4df61897448ab6ae3b63b6814e7b96499.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c36ab3be7e5ce6edb61b378d6b8625c4df61897448ab6ae3b63b6814e7b96499.dll
Resource
win10v2004-20231023-en
General
-
Target
c36ab3be7e5ce6edb61b378d6b8625c4df61897448ab6ae3b63b6814e7b96499.dll
-
Size
51KB
-
MD5
cca5e5640221e2e892efad98933fa23d
-
SHA1
32cbe523275a8a4815e42398c4b1c9ff2fcec5b7
-
SHA256
c36ab3be7e5ce6edb61b378d6b8625c4df61897448ab6ae3b63b6814e7b96499
-
SHA512
444649062570eb1f43c44b050457a599bc0cf3f2726d4d64bbd085b66ed33aa83f69caa1cd356f277442284c93ba42a65fcad3d30ece146276f3b1688592304b
-
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezPSsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBBpMC6H
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4660 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4660 4900 rundll32.exe 85 PID 4900 wrote to memory of 4660 4900 rundll32.exe 85 PID 4900 wrote to memory of 4660 4900 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c36ab3be7e5ce6edb61b378d6b8625c4df61897448ab6ae3b63b6814e7b96499.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c36ab3be7e5ce6edb61b378d6b8625c4df61897448ab6ae3b63b6814e7b96499.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4660
-