Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 05:33
Behavioral task
behavioral1
Sample
fc5af24620a7e069f82bca9edb02872e099acf7a44ed0ebedcf1b8f46cc1e410.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fc5af24620a7e069f82bca9edb02872e099acf7a44ed0ebedcf1b8f46cc1e410.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
fc5af24620a7e069f82bca9edb02872e099acf7a44ed0ebedcf1b8f46cc1e410.dll
-
Size
51KB
-
MD5
f4741eab1b89815ad1b63fc0f1939b6d
-
SHA1
8d41a7cd755df85bf76f5850f4d8cf4d0e01f3d9
-
SHA256
fc5af24620a7e069f82bca9edb02872e099acf7a44ed0ebedcf1b8f46cc1e410
-
SHA512
83b02dd59e2b104b70d05540c02b25cda83f2956fdbf087f307ee77462c5b4a7306ca516a5076d0663c0c271180bc0ec11ab8b7442505c369a7a24a3d1e70650
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLtJYH5:1dWubF3n9S91BF3fboxJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3244 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3244 4548 rundll32.exe 89 PID 4548 wrote to memory of 3244 4548 rundll32.exe 89 PID 4548 wrote to memory of 3244 4548 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc5af24620a7e069f82bca9edb02872e099acf7a44ed0ebedcf1b8f46cc1e410.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc5af24620a7e069f82bca9edb02872e099acf7a44ed0ebedcf1b8f46cc1e410.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3244
-