Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 15:31
Behavioral task
behavioral1
Sample
2feb6b0e3e0bf22215e60aadbb443e943013b68544aae0ef92fee8973f742cdf.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2feb6b0e3e0bf22215e60aadbb443e943013b68544aae0ef92fee8973f742cdf.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2feb6b0e3e0bf22215e60aadbb443e943013b68544aae0ef92fee8973f742cdf.dll
-
Size
51KB
-
MD5
61c467045f32181fc0528964cc73a8ec
-
SHA1
8663c199a6df3146a2e0cb485ecc941f9a989a11
-
SHA256
2feb6b0e3e0bf22215e60aadbb443e943013b68544aae0ef92fee8973f742cdf
-
SHA512
3b5e2b0edb774f5d824e3a81f6c55c26afb025ebcfd833f9797e9b72817397ce75e9c3d04ecf241131deb9c7ac1412f95d91e52b8776689c66dcb6d00e165b7f
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLVJYH5:1dWubF3n9S91BF3fboRJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2044 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2044 2952 rundll32.exe 28 PID 2952 wrote to memory of 2044 2952 rundll32.exe 28 PID 2952 wrote to memory of 2044 2952 rundll32.exe 28 PID 2952 wrote to memory of 2044 2952 rundll32.exe 28 PID 2952 wrote to memory of 2044 2952 rundll32.exe 28 PID 2952 wrote to memory of 2044 2952 rundll32.exe 28 PID 2952 wrote to memory of 2044 2952 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2feb6b0e3e0bf22215e60aadbb443e943013b68544aae0ef92fee8973f742cdf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2feb6b0e3e0bf22215e60aadbb443e943013b68544aae0ef92fee8973f742cdf.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2044
-