Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 17:42
Behavioral task
behavioral1
Sample
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll
-
Size
899KB
-
MD5
e1dbcc40b37aec06c061fd2eaacdf651
-
SHA1
b7aea7325b9306903df0d17e4cf92ca98258b1fa
-
SHA256
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6
-
SHA512
0223817df46ce6881da1c2773f4d8977914693b13e68fe7141293e5e34a7cd9308a3c0bc9f12d830820d29dd2774b4e4d0638027001c4518f57838eb2c59f8a8
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXL:7wqd87VL
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2072 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2072
-