Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 23:08
Behavioral task
behavioral1
Sample
3647b52c4f956bc30ec91b35a1b80d2c68e058c261d87e9c903c5455691dc7c7.dll
Resource
win7-20240319-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3647b52c4f956bc30ec91b35a1b80d2c68e058c261d87e9c903c5455691dc7c7.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3647b52c4f956bc30ec91b35a1b80d2c68e058c261d87e9c903c5455691dc7c7.dll
-
Size
51KB
-
MD5
ad416b41cec0c27de048624d1454835b
-
SHA1
6413637516237936ae791f82658e45eb2175b1cb
-
SHA256
3647b52c4f956bc30ec91b35a1b80d2c68e058c261d87e9c903c5455691dc7c7
-
SHA512
42d645f7930c36c7bbacfc00938c83aea89ecf48f7f738e6a1b5e419ff9fd990ff002baa0643cb8f55c82a5701fc3978e55929d8286ec3ae2a7aa38c005a3c6a
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL1JYH5:1dWubF3n9S91BF3fboBJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2328 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2328 1280 rundll32.exe 28 PID 1280 wrote to memory of 2328 1280 rundll32.exe 28 PID 1280 wrote to memory of 2328 1280 rundll32.exe 28 PID 1280 wrote to memory of 2328 1280 rundll32.exe 28 PID 1280 wrote to memory of 2328 1280 rundll32.exe 28 PID 1280 wrote to memory of 2328 1280 rundll32.exe 28 PID 1280 wrote to memory of 2328 1280 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3647b52c4f956bc30ec91b35a1b80d2c68e058c261d87e9c903c5455691dc7c7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3647b52c4f956bc30ec91b35a1b80d2c68e058c261d87e9c903c5455691dc7c7.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2328
-