Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 15:01
Behavioral task
behavioral1
Sample
563fcae4fa9f3382ff0b2ddc72881d89c35a8ac6435bd1e8bc58030a73f556dc.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
563fcae4fa9f3382ff0b2ddc72881d89c35a8ac6435bd1e8bc58030a73f556dc.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
563fcae4fa9f3382ff0b2ddc72881d89c35a8ac6435bd1e8bc58030a73f556dc.dll
-
Size
899KB
-
MD5
09a577b72ae5cc88bdbe8f55d024bb58
-
SHA1
65762b3bcf8a8abdcb0bd2206647f73db7cd887b
-
SHA256
563fcae4fa9f3382ff0b2ddc72881d89c35a8ac6435bd1e8bc58030a73f556dc
-
SHA512
e75101510556c9cc43b9817ec0600ac6c5059f0d33ed3f66d9253106283d65197bf2b30d6221631ecf7c1da40e3bf8d9c9a51e0a2119fb5d51a7564cbe413504
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXz:7wqd87Vz
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3352 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3352 4140 rundll32.exe 84 PID 4140 wrote to memory of 3352 4140 rundll32.exe 84 PID 4140 wrote to memory of 3352 4140 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\563fcae4fa9f3382ff0b2ddc72881d89c35a8ac6435bd1e8bc58030a73f556dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\563fcae4fa9f3382ff0b2ddc72881d89c35a8ac6435bd1e8bc58030a73f556dc.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3352
-