Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 09:35
Behavioral task
behavioral1
Sample
841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll
-
Size
51KB
-
MD5
cb78fd5126186f0a3eb1ba03a04b59a9
-
SHA1
ca5492e8a225cb502d2a8b9ce06b899e0a61a14d
-
SHA256
841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9
-
SHA512
5cedd22936f636217b868b1628f9f4b719983162f5959baa9b16e90c6a2ab1ba4b7086f928599c55e8562c1c3655a276012973e90b3719cb4c6860b97a15e506
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLMJYH5:1dWubF3n9S91BF3fbogJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2456 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2456 2188 rundll32.exe 28 PID 2188 wrote to memory of 2456 2188 rundll32.exe 28 PID 2188 wrote to memory of 2456 2188 rundll32.exe 28 PID 2188 wrote to memory of 2456 2188 rundll32.exe 28 PID 2188 wrote to memory of 2456 2188 rundll32.exe 28 PID 2188 wrote to memory of 2456 2188 rundll32.exe 28 PID 2188 wrote to memory of 2456 2188 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\841c8b6c496f00641b65d7189230a447c2ceaa06c6c0e2b3e6dc61b55a412eb9.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2456
-