Analysis
-
max time kernel
127s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 19:11
Behavioral task
behavioral1
Sample
1e609ec710370e12cb3df7d375b1633d22650ba81ff21c7de3ad3049f25e9cb4.dll
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1e609ec710370e12cb3df7d375b1633d22650ba81ff21c7de3ad3049f25e9cb4.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
1e609ec710370e12cb3df7d375b1633d22650ba81ff21c7de3ad3049f25e9cb4.dll
-
Size
51KB
-
MD5
75d3cc1388831c92b6ec43c8dac202dd
-
SHA1
1cba3a6d0323d05e9fcbeae618faa873c8f9b382
-
SHA256
1e609ec710370e12cb3df7d375b1633d22650ba81ff21c7de3ad3049f25e9cb4
-
SHA512
34a85e09a7f9d6ba533dc3dc8bf2e128cbc4479dcf80eba957b6bd4f3a23e534c1fbf13b94fe2f39f6488ddf9a8dcbaf8a7b6197f46ca36afa6daa406ecaaa23
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLIJYH5:1dWubF3n9S91BF3fboUJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2832 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2832 1688 rundll32.exe 28 PID 1688 wrote to memory of 2832 1688 rundll32.exe 28 PID 1688 wrote to memory of 2832 1688 rundll32.exe 28 PID 1688 wrote to memory of 2832 1688 rundll32.exe 28 PID 1688 wrote to memory of 2832 1688 rundll32.exe 28 PID 1688 wrote to memory of 2832 1688 rundll32.exe 28 PID 1688 wrote to memory of 2832 1688 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e609ec710370e12cb3df7d375b1633d22650ba81ff21c7de3ad3049f25e9cb4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e609ec710370e12cb3df7d375b1633d22650ba81ff21c7de3ad3049f25e9cb4.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2832
-