Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 22:01
Behavioral task
behavioral1
Sample
ed186b62d2028ac3aeb65cedaa4dc9f5b001fec3f96ff4de0ae4590ed2a60b06.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ed186b62d2028ac3aeb65cedaa4dc9f5b001fec3f96ff4de0ae4590ed2a60b06.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
ed186b62d2028ac3aeb65cedaa4dc9f5b001fec3f96ff4de0ae4590ed2a60b06.dll
-
Size
899KB
-
MD5
1217cad12f8921ad72acd46025ede5ad
-
SHA1
2f28db61abd3fcffe9f3e1213a528661e6230437
-
SHA256
ed186b62d2028ac3aeb65cedaa4dc9f5b001fec3f96ff4de0ae4590ed2a60b06
-
SHA512
f482aaaf9964a06031b3ba2d4263b2373f1adb37eab867cc2670a99f058441093451f8c0d98fd1a3c7690e6b2a762f95d4817888631be2594b38b548a937af1c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXX:7wqd87VX
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1704 1692 rundll32.exe 28 PID 1692 wrote to memory of 1704 1692 rundll32.exe 28 PID 1692 wrote to memory of 1704 1692 rundll32.exe 28 PID 1692 wrote to memory of 1704 1692 rundll32.exe 28 PID 1692 wrote to memory of 1704 1692 rundll32.exe 28 PID 1692 wrote to memory of 1704 1692 rundll32.exe 28 PID 1692 wrote to memory of 1704 1692 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed186b62d2028ac3aeb65cedaa4dc9f5b001fec3f96ff4de0ae4590ed2a60b06.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed186b62d2028ac3aeb65cedaa4dc9f5b001fec3f96ff4de0ae4590ed2a60b06.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1704
-