Analysis
-
max time kernel
92s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 17:42
Behavioral task
behavioral1
Sample
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll
-
Size
899KB
-
MD5
e1dbcc40b37aec06c061fd2eaacdf651
-
SHA1
b7aea7325b9306903df0d17e4cf92ca98258b1fa
-
SHA256
5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6
-
SHA512
0223817df46ce6881da1c2773f4d8977914693b13e68fe7141293e5e34a7cd9308a3c0bc9f12d830820d29dd2774b4e4d0638027001c4518f57838eb2c59f8a8
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXL:7wqd87VL
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 184 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 184 4392 rundll32.exe 88 PID 4392 wrote to memory of 184 4392 rundll32.exe 88 PID 4392 wrote to memory of 184 4392 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a2c8e3efccae2c6656d53afb1ca6407e36b321b74d0969db5811f658dedebf6.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:184
-