Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 23:41
Behavioral task
behavioral1
Sample
40fee7d2a0f24808805eefdf1f8098e8d49107fb2018b1ee02f12aa043cd7ab3.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
40fee7d2a0f24808805eefdf1f8098e8d49107fb2018b1ee02f12aa043cd7ab3.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
40fee7d2a0f24808805eefdf1f8098e8d49107fb2018b1ee02f12aa043cd7ab3.dll
-
Size
899KB
-
MD5
28af441e5725700416d3b46517428bf9
-
SHA1
d1e230b5e9974a7379c9a03c1655fb0ac1c77237
-
SHA256
40fee7d2a0f24808805eefdf1f8098e8d49107fb2018b1ee02f12aa043cd7ab3
-
SHA512
d72f7c595392b9fa9ddb4b063d5730be75adca38210703228014844037ea5c788ad1742f6f0ddc3ce37db1609df6ce7a083827248236397ed89b5b577aea1c00
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX8:7wqd87V8
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2104 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2104 2072 rundll32.exe 28 PID 2072 wrote to memory of 2104 2072 rundll32.exe 28 PID 2072 wrote to memory of 2104 2072 rundll32.exe 28 PID 2072 wrote to memory of 2104 2072 rundll32.exe 28 PID 2072 wrote to memory of 2104 2072 rundll32.exe 28 PID 2072 wrote to memory of 2104 2072 rundll32.exe 28 PID 2072 wrote to memory of 2104 2072 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40fee7d2a0f24808805eefdf1f8098e8d49107fb2018b1ee02f12aa043cd7ab3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40fee7d2a0f24808805eefdf1f8098e8d49107fb2018b1ee02f12aa043cd7ab3.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2104
-