Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 16:08
Behavioral task
behavioral1
Sample
a7015bed64cc4d96ee6f7fd903863924c401cfbd14e60a9292433c55bd200b93.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a7015bed64cc4d96ee6f7fd903863924c401cfbd14e60a9292433c55bd200b93.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a7015bed64cc4d96ee6f7fd903863924c401cfbd14e60a9292433c55bd200b93.dll
-
Size
51KB
-
MD5
d5d91d62fc5a204e7592980ee404d7f5
-
SHA1
e855a2db28d1a1fbd712a0991b1474a20d32d1c0
-
SHA256
a7015bed64cc4d96ee6f7fd903863924c401cfbd14e60a9292433c55bd200b93
-
SHA512
d17a629c6dd08e2fda9787ff30a8416cfd7e7e4f93d2385d13e2cd88a5123e93133704317e58809de9530c3f84d3beb12a9743ca6ea6ac6fe1e75249472d5222
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLnJYH5:1dWubF3n9S91BF3fbo7JYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4524 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4524 4900 rundll32.exe 87 PID 4900 wrote to memory of 4524 4900 rundll32.exe 87 PID 4900 wrote to memory of 4524 4900 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7015bed64cc4d96ee6f7fd903863924c401cfbd14e60a9292433c55bd200b93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7015bed64cc4d96ee6f7fd903863924c401cfbd14e60a9292433c55bd200b93.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4524
-