Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2023, 20:58
Behavioral task
behavioral1
Sample
a98d3774393809d5baf642c9493fe1b96ac94582edc420ea485d9296daa29255.dll
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a98d3774393809d5baf642c9493fe1b96ac94582edc420ea485d9296daa29255.dll
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
a98d3774393809d5baf642c9493fe1b96ac94582edc420ea485d9296daa29255.dll
-
Size
899KB
-
MD5
56ce2320f7bca2c5c3dcabfb4795962a
-
SHA1
ca30e23541ca4802c5eb964e4aaf56b4a33518d5
-
SHA256
a98d3774393809d5baf642c9493fe1b96ac94582edc420ea485d9296daa29255
-
SHA512
cfa92787bb38c04e864645c51f22c8e4f4ebc654b29e3c9da5af811e13e9016645c4b1d725647f476fc9fb811bd093d67461dec193412fbc760034107b4ac631
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXF:7wqd87VF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 368 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4912 wrote to memory of 368 4912 rundll32.exe 84 PID 4912 wrote to memory of 368 4912 rundll32.exe 84 PID 4912 wrote to memory of 368 4912 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a98d3774393809d5baf642c9493fe1b96ac94582edc420ea485d9296daa29255.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a98d3774393809d5baf642c9493fe1b96ac94582edc420ea485d9296daa29255.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:368
-