Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 14:56
Behavioral task
behavioral1
Sample
b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll
-
Size
899KB
-
MD5
4df197d2287112a2b5ce26b1aa3862b6
-
SHA1
df63aec00c57ff5b5a0a04c40a9ba8b6cbf515e3
-
SHA256
b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2
-
SHA512
16b8df24dfb79c0bf23e7840f88248cd9956887cf5c6d5515a3cebf76a6c46102f2477d9693ef9db83b2dad318da0278d1ff6b944c68cb62dc396b1d4ba605e6
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXZ:7wqd87VZ
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5100 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 5100 4236 rundll32.exe 84 PID 4236 wrote to memory of 5100 4236 rundll32.exe 84 PID 4236 wrote to memory of 5100 4236 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b203620dbc245cc2e45bea58b1d0568fda5d03675a423673b52db2b94b8041b2.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:5100
-