Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 15:51
Behavioral task
behavioral1
Sample
9982cb1060123ac5bb053f282b364a25c855d563e54505c675ddc5f1dd83aa60.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
9982cb1060123ac5bb053f282b364a25c855d563e54505c675ddc5f1dd83aa60.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
9982cb1060123ac5bb053f282b364a25c855d563e54505c675ddc5f1dd83aa60.dll
-
Size
51KB
-
MD5
3952cf0f67c2b0a72ed7fb08587c23b1
-
SHA1
baf99ce82de94e464418e407d0e5418bf6f09245
-
SHA256
9982cb1060123ac5bb053f282b364a25c855d563e54505c675ddc5f1dd83aa60
-
SHA512
2707699168e57d3310aadbe74b24882ce6b19a17d646e335ae7c5632fcdf0c1f25df432412701c5510b553e6115daf11bf0721c9459fc6c869eda83a0f17add2
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLtJYH5:1dWubF3n9S91BF3fboBJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4272 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 4272 4184 rundll32.exe 84 PID 4184 wrote to memory of 4272 4184 rundll32.exe 84 PID 4184 wrote to memory of 4272 4184 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9982cb1060123ac5bb053f282b364a25c855d563e54505c675ddc5f1dd83aa60.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9982cb1060123ac5bb053f282b364a25c855d563e54505c675ddc5f1dd83aa60.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4272
-