Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 18:39
Behavioral task
behavioral1
Sample
257be82591682f879b7205bf990237ee7ccf4e9d3032289b7874cc8a99291845.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
257be82591682f879b7205bf990237ee7ccf4e9d3032289b7874cc8a99291845.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
257be82591682f879b7205bf990237ee7ccf4e9d3032289b7874cc8a99291845.dll
-
Size
51KB
-
MD5
f9a72c906a48e1c015fdc8317f97db10
-
SHA1
475510d8f06e73186f9a20b4d646737dc50c836e
-
SHA256
257be82591682f879b7205bf990237ee7ccf4e9d3032289b7874cc8a99291845
-
SHA512
0f1baf08a66e60e8c48f3a11aff82068d20f43066a29021007fdd0a34a8f88aa75bbcae2170462b659b3ef6c75cfc7a2e5c296c969a922b543b6ea2096822d2c
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLuJYH5:1dWubF3n9S91BF3fboSJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1420 wrote to memory of 3288 1420 rundll32.exe 88 PID 1420 wrote to memory of 3288 1420 rundll32.exe 88 PID 1420 wrote to memory of 3288 1420 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\257be82591682f879b7205bf990237ee7ccf4e9d3032289b7874cc8a99291845.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\257be82591682f879b7205bf990237ee7ccf4e9d3032289b7874cc8a99291845.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3288
-