Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 19:50
Behavioral task
behavioral1
Sample
58a560133872c1329f0a98aac706659725301869d06a96480cf91fca003bb398.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
58a560133872c1329f0a98aac706659725301869d06a96480cf91fca003bb398.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
58a560133872c1329f0a98aac706659725301869d06a96480cf91fca003bb398.dll
-
Size
51KB
-
MD5
459dff1f31c178b39453e2a336eb41ef
-
SHA1
3059c6237a465027fe4e31d5b2a7c528d5ee66d0
-
SHA256
58a560133872c1329f0a98aac706659725301869d06a96480cf91fca003bb398
-
SHA512
79359d2b24d9ffeb31cdd5864c853d9383c2a24bba08c04aed4f88492c70c70012b681d3c04059527bff5081fcebadd484f78391c501ef14979dc8b252ec65bb
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL+JYH5:1dWubF3n9S91BF3fboaJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2168 1400 rundll32.exe 28 PID 1400 wrote to memory of 2168 1400 rundll32.exe 28 PID 1400 wrote to memory of 2168 1400 rundll32.exe 28 PID 1400 wrote to memory of 2168 1400 rundll32.exe 28 PID 1400 wrote to memory of 2168 1400 rundll32.exe 28 PID 1400 wrote to memory of 2168 1400 rundll32.exe 28 PID 1400 wrote to memory of 2168 1400 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58a560133872c1329f0a98aac706659725301869d06a96480cf91fca003bb398.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58a560133872c1329f0a98aac706659725301869d06a96480cf91fca003bb398.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2168
-