Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 19:01
Behavioral task
behavioral1
Sample
c43bb324b99914f15fd8c06780cc1b4464918e383804be6ab513ff72ea590cc1.dll
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c43bb324b99914f15fd8c06780cc1b4464918e383804be6ab513ff72ea590cc1.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
c43bb324b99914f15fd8c06780cc1b4464918e383804be6ab513ff72ea590cc1.dll
-
Size
51KB
-
MD5
b7e8c4b266bae5e093972b81f2b869d5
-
SHA1
2c4afa7c4f2275832017393e0f257b8c426ae4de
-
SHA256
c43bb324b99914f15fd8c06780cc1b4464918e383804be6ab513ff72ea590cc1
-
SHA512
602e657b2eacd98f11f3d65a92a60fbc8da383bc446b798a1f778a360403561db491ffa8ee1e54c8d631bacfef06f5e5d0fe49b9de021936d5713af6c6c8c30b
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLEJYH5:1dWubF3n9S91BF3fboAJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2596 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2596 4580 rundll32.exe 87 PID 4580 wrote to memory of 2596 4580 rundll32.exe 87 PID 4580 wrote to memory of 2596 4580 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c43bb324b99914f15fd8c06780cc1b4464918e383804be6ab513ff72ea590cc1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c43bb324b99914f15fd8c06780cc1b4464918e383804be6ab513ff72ea590cc1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2596
-