Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 17:58
Behavioral task
behavioral1
Sample
c3fbb2b9324a674f63e8d8fd3d537dee36b67df8f9bbb920ef66e3e10bc0740b.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c3fbb2b9324a674f63e8d8fd3d537dee36b67df8f9bbb920ef66e3e10bc0740b.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
c3fbb2b9324a674f63e8d8fd3d537dee36b67df8f9bbb920ef66e3e10bc0740b.dll
-
Size
899KB
-
MD5
28423a97236341e4f5c57f7e76607fa9
-
SHA1
b66ae37fb3581ecd4cdbc7d5958b1a7c2f26b6af
-
SHA256
c3fbb2b9324a674f63e8d8fd3d537dee36b67df8f9bbb920ef66e3e10bc0740b
-
SHA512
787c1e2f43d4b610ff9345764b363fc7c195b93ade383747a8bd5da9781ff2c6eb85c539338c6f1057c5f86e7c2d92c89f39e486bac356ab5b7140b27d923988
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXU:7wqd87VU
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1912 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1912 2144 rundll32.exe 28 PID 2144 wrote to memory of 1912 2144 rundll32.exe 28 PID 2144 wrote to memory of 1912 2144 rundll32.exe 28 PID 2144 wrote to memory of 1912 2144 rundll32.exe 28 PID 2144 wrote to memory of 1912 2144 rundll32.exe 28 PID 2144 wrote to memory of 1912 2144 rundll32.exe 28 PID 2144 wrote to memory of 1912 2144 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3fbb2b9324a674f63e8d8fd3d537dee36b67df8f9bbb920ef66e3e10bc0740b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3fbb2b9324a674f63e8d8fd3d537dee36b67df8f9bbb920ef66e3e10bc0740b.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1912
-