Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 01:05
Behavioral task
behavioral1
Sample
b4a542a01c1f39cae925357a3614ecee8d91bb10052385e60b15d743402d9ae0.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b4a542a01c1f39cae925357a3614ecee8d91bb10052385e60b15d743402d9ae0.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b4a542a01c1f39cae925357a3614ecee8d91bb10052385e60b15d743402d9ae0.dll
-
Size
899KB
-
MD5
750461eebd4704319613027ccb5a3487
-
SHA1
eee7e7ad5587def3ce3478df6a7fecd566c2112d
-
SHA256
b4a542a01c1f39cae925357a3614ecee8d91bb10052385e60b15d743402d9ae0
-
SHA512
dc6087a79e716c4742482b864bc4a815dc5ef0c1a2731d8e14cffaa16da520c2977e8ef897bf1c7a3af73d68d71cc564624e024a3aec1be9eb094958168cb091
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXu:7wqd87Vu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2776 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2776 1244 rundll32.exe 14 PID 1244 wrote to memory of 2776 1244 rundll32.exe 14 PID 1244 wrote to memory of 2776 1244 rundll32.exe 14 PID 1244 wrote to memory of 2776 1244 rundll32.exe 14 PID 1244 wrote to memory of 2776 1244 rundll32.exe 14 PID 1244 wrote to memory of 2776 1244 rundll32.exe 14 PID 1244 wrote to memory of 2776 1244 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4a542a01c1f39cae925357a3614ecee8d91bb10052385e60b15d743402d9ae0.dll,#11⤵
- Suspicious behavior: RenamesItself
PID:2776
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4a542a01c1f39cae925357a3614ecee8d91bb10052385e60b15d743402d9ae0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1244