Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:15
Behavioral task
behavioral1
Sample
a31ca2251028658ebc7af69175e8975986f1e3d31e8f51185b33a699b4a68d67.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a31ca2251028658ebc7af69175e8975986f1e3d31e8f51185b33a699b4a68d67.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
a31ca2251028658ebc7af69175e8975986f1e3d31e8f51185b33a699b4a68d67.dll
-
Size
899KB
-
MD5
91e9515fa1b16a744cbdfd7d94475dd9
-
SHA1
ac75c3e7edd22c75915ded9ee22a7e0759667bd7
-
SHA256
a31ca2251028658ebc7af69175e8975986f1e3d31e8f51185b33a699b4a68d67
-
SHA512
02139ada794732a1fa256f813759a8f0e31d8d4e9fbb82efee8d9bac5c6cd43b4ddcc353b0a0ec16a2249e7469449bdf486b62f5d137ed55eb7a5eacc063d27c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXu:7wqd87Vu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4540 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4540 2820 rundll32.exe 84 PID 2820 wrote to memory of 4540 2820 rundll32.exe 84 PID 2820 wrote to memory of 4540 2820 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a31ca2251028658ebc7af69175e8975986f1e3d31e8f51185b33a699b4a68d67.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a31ca2251028658ebc7af69175e8975986f1e3d31e8f51185b33a699b4a68d67.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4540
-