Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 17:07
Behavioral task
behavioral1
Sample
371e7153e74b2ad4780f04ea6f5af645274f9e308305ac2787dd216908a342b9.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
371e7153e74b2ad4780f04ea6f5af645274f9e308305ac2787dd216908a342b9.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
371e7153e74b2ad4780f04ea6f5af645274f9e308305ac2787dd216908a342b9.dll
-
Size
899KB
-
MD5
0d8de3ad77c47aadb2b763bb63fd6d72
-
SHA1
60b1f77bb148cae76122cfd19e7b2cde859c67b4
-
SHA256
371e7153e74b2ad4780f04ea6f5af645274f9e308305ac2787dd216908a342b9
-
SHA512
c54d6cc5a558149cfc470de4ec8abb6efaf6039638b191342bbbb9e0840dfd8f24737f7cf54bece7315e152008d27b467a91d6c92b73d771c0c5d92b0a692450
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXv:7wqd87Vv
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2304 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2304 2024 rundll32.exe 28 PID 2024 wrote to memory of 2304 2024 rundll32.exe 28 PID 2024 wrote to memory of 2304 2024 rundll32.exe 28 PID 2024 wrote to memory of 2304 2024 rundll32.exe 28 PID 2024 wrote to memory of 2304 2024 rundll32.exe 28 PID 2024 wrote to memory of 2304 2024 rundll32.exe 28 PID 2024 wrote to memory of 2304 2024 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\371e7153e74b2ad4780f04ea6f5af645274f9e308305ac2787dd216908a342b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\371e7153e74b2ad4780f04ea6f5af645274f9e308305ac2787dd216908a342b9.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2304
-