Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 19:32
Behavioral task
behavioral1
Sample
522d1e5f83d7db9c66cd70b5ff13f5d0291654e3fcb884991c0057a148c5ee72.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
522d1e5f83d7db9c66cd70b5ff13f5d0291654e3fcb884991c0057a148c5ee72.dll
Resource
win10v2004-20240221-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
522d1e5f83d7db9c66cd70b5ff13f5d0291654e3fcb884991c0057a148c5ee72.dll
-
Size
51KB
-
MD5
b7ddbd85659b11ff8f8217fbc0254198
-
SHA1
7afd88c689223d25e91ae871e52d76d6af5728a7
-
SHA256
522d1e5f83d7db9c66cd70b5ff13f5d0291654e3fcb884991c0057a148c5ee72
-
SHA512
1af84a4d2d1f916093f1b96e8ed662ff0fb5da894eee317ba07b2caad8e75b54d4d914b6248aff5ef6fe6ecb955f258c8ae987765bdad0248cf43c6499e1ca02
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLAJYH5:1dWubF3n9S91BF3fbocJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4728 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4728 3152 rundll32.exe 51 PID 3152 wrote to memory of 4728 3152 rundll32.exe 51 PID 3152 wrote to memory of 4728 3152 rundll32.exe 51
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\522d1e5f83d7db9c66cd70b5ff13f5d0291654e3fcb884991c0057a148c5ee72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\522d1e5f83d7db9c66cd70b5ff13f5d0291654e3fcb884991c0057a148c5ee72.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4728
-