Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 19:21
Behavioral task
behavioral1
Sample
e0c257c6d58a4c5d9398315194d508833be94b338ca0004b16510d46f0aee38a.dll
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e0c257c6d58a4c5d9398315194d508833be94b338ca0004b16510d46f0aee38a.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
e0c257c6d58a4c5d9398315194d508833be94b338ca0004b16510d46f0aee38a.dll
-
Size
899KB
-
MD5
9f3d493eec531aaaec0240ad107a31fe
-
SHA1
05befea96e2bba03c8ce2047ad8443b3b63b95f2
-
SHA256
e0c257c6d58a4c5d9398315194d508833be94b338ca0004b16510d46f0aee38a
-
SHA512
84f3e09c76cd22c3d19382d1fbb6621dbdb8ae93f66886579d5d8c23a6146fce11107f756a39826067627cd47ee892f2ecdc024353fa892f0ab1e7ed88130edc
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXo:7wqd87Vo
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4520 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4520 4804 rundll32.exe 88 PID 4804 wrote to memory of 4520 4804 rundll32.exe 88 PID 4804 wrote to memory of 4520 4804 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0c257c6d58a4c5d9398315194d508833be94b338ca0004b16510d46f0aee38a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0c257c6d58a4c5d9398315194d508833be94b338ca0004b16510d46f0aee38a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4520
-