Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 19:15
Behavioral task
behavioral1
Sample
432937235d5a136c9353c2859f0263ad0ce2d8d2c8ca01a355d11d2cfec99345.dll
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
432937235d5a136c9353c2859f0263ad0ce2d8d2c8ca01a355d11d2cfec99345.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
432937235d5a136c9353c2859f0263ad0ce2d8d2c8ca01a355d11d2cfec99345.dll
-
Size
51KB
-
MD5
8c33b07cbf7bf1bfba55af72de8ae59e
-
SHA1
9757da3e845a59fd8d11e0ac310761d2cd2ce9e4
-
SHA256
432937235d5a136c9353c2859f0263ad0ce2d8d2c8ca01a355d11d2cfec99345
-
SHA512
c7c96d3d12ce7df0181ab3b04b78945959a59db1af16e84644872486e8c13e807862e387480f0a4027aebca8ec7325fe87370957a43e99fecf8fd756be09ca5d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL8JYH5:1dWubF3n9S91BF3fbooJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1752 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1752 4856 rundll32.exe 88 PID 4856 wrote to memory of 1752 4856 rundll32.exe 88 PID 4856 wrote to memory of 1752 4856 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\432937235d5a136c9353c2859f0263ad0ce2d8d2c8ca01a355d11d2cfec99345.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\432937235d5a136c9353c2859f0263ad0ce2d8d2c8ca01a355d11d2cfec99345.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1752
-