Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 22:11
Behavioral task
behavioral1
Sample
bdd7118ad0bcbec4872d13104a5e21fb74013dd0df285dfc37df390274837368.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bdd7118ad0bcbec4872d13104a5e21fb74013dd0df285dfc37df390274837368.dll
Resource
win10v2004-20240220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
bdd7118ad0bcbec4872d13104a5e21fb74013dd0df285dfc37df390274837368.dll
-
Size
51KB
-
MD5
db754ba4c30c8e69127fc304badd2d77
-
SHA1
9808ea524d40319af767d68f1c9d52e0955e79b1
-
SHA256
bdd7118ad0bcbec4872d13104a5e21fb74013dd0df285dfc37df390274837368
-
SHA512
749b38af65e825acb457368317d112a0f30253051ab2ec2927c613637feb508016605e4bea959ae8a879469f738322a06614417b5d2638255bede08abc8a65fd
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLRJYH5:1dWubF3n9S91BF3fbodJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2760 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2760 2040 rundll32.exe 28 PID 2040 wrote to memory of 2760 2040 rundll32.exe 28 PID 2040 wrote to memory of 2760 2040 rundll32.exe 28 PID 2040 wrote to memory of 2760 2040 rundll32.exe 28 PID 2040 wrote to memory of 2760 2040 rundll32.exe 28 PID 2040 wrote to memory of 2760 2040 rundll32.exe 28 PID 2040 wrote to memory of 2760 2040 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bdd7118ad0bcbec4872d13104a5e21fb74013dd0df285dfc37df390274837368.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bdd7118ad0bcbec4872d13104a5e21fb74013dd0df285dfc37df390274837368.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2760
-