Analysis
-
max time kernel
233s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 05:17
Behavioral task
behavioral1
Sample
5b3422f2729f2350fac379c8e6279162b16c368f7de9d38476801265f796a545.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b3422f2729f2350fac379c8e6279162b16c368f7de9d38476801265f796a545.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
5b3422f2729f2350fac379c8e6279162b16c368f7de9d38476801265f796a545.dll
-
Size
899KB
-
MD5
5a732667cbb5be4340425332e1ba776d
-
SHA1
3050fe4f70be647ecb2724337f829bc402fb1ba5
-
SHA256
5b3422f2729f2350fac379c8e6279162b16c368f7de9d38476801265f796a545
-
SHA512
511cd5381f363f124aad383b802bc44ca66b58ddf06f88b59dd7e12b39ba4c83dac3e0417ca92a591170ef5f20ea738835b966b4928b644af48c74a95ee1506e
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX+:7wqd87V+
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2904 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 2904 4684 rundll32.exe 88 PID 4684 wrote to memory of 2904 4684 rundll32.exe 88 PID 4684 wrote to memory of 2904 4684 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b3422f2729f2350fac379c8e6279162b16c368f7de9d38476801265f796a545.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b3422f2729f2350fac379c8e6279162b16c368f7de9d38476801265f796a545.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2904
-