Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 12:32
Behavioral task
behavioral1
Sample
1057e90230f355d0c8291113794011594a66be367a2c6674c33fdbfd14a2d7f1.dll
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1057e90230f355d0c8291113794011594a66be367a2c6674c33fdbfd14a2d7f1.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1057e90230f355d0c8291113794011594a66be367a2c6674c33fdbfd14a2d7f1.dll
-
Size
51KB
-
MD5
ad63b96bcfe30c1e36e11663b41cb249
-
SHA1
ed4dc8a2bdbab22d90f1cf01048ee9bed12b7074
-
SHA256
1057e90230f355d0c8291113794011594a66be367a2c6674c33fdbfd14a2d7f1
-
SHA512
74a891c900466cc3b819916a460d52c43ba159d338f8a95ab8d2692cca9c9b5cc4834b795d048ca84793a5a8624804bf0a1777ce6e5153103e1844acbba09d62
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLFJYH5:1dWubF3n9S91BF3fbo5JYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3880 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3880 4528 rundll32.exe 84 PID 4528 wrote to memory of 3880 4528 rundll32.exe 84 PID 4528 wrote to memory of 3880 4528 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1057e90230f355d0c8291113794011594a66be367a2c6674c33fdbfd14a2d7f1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1057e90230f355d0c8291113794011594a66be367a2c6674c33fdbfd14a2d7f1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3880
-