Analysis
-
max time kernel
127s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 17:12
Behavioral task
behavioral1
Sample
773b407ed2140c53ecd7b71c4473b6390c93bb1b467584d411626bd50d7066c2.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
773b407ed2140c53ecd7b71c4473b6390c93bb1b467584d411626bd50d7066c2.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
773b407ed2140c53ecd7b71c4473b6390c93bb1b467584d411626bd50d7066c2.dll
-
Size
899KB
-
MD5
fc17a52fabaa961fe884b9c38f62ed6e
-
SHA1
aee234990eea5c33fa1956b755de39d97c1eb729
-
SHA256
773b407ed2140c53ecd7b71c4473b6390c93bb1b467584d411626bd50d7066c2
-
SHA512
52dac6f18e6630130c3fae6fe33dba5fac2a431f620a763ba93ec04885b39aeeeb5846bb7f150ac844c0ee2453f008e5e88f694b1e4b30c272acdca91a9fc23a
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXF:7wqd87VF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2352 3008 rundll32.exe 28 PID 3008 wrote to memory of 2352 3008 rundll32.exe 28 PID 3008 wrote to memory of 2352 3008 rundll32.exe 28 PID 3008 wrote to memory of 2352 3008 rundll32.exe 28 PID 3008 wrote to memory of 2352 3008 rundll32.exe 28 PID 3008 wrote to memory of 2352 3008 rundll32.exe 28 PID 3008 wrote to memory of 2352 3008 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\773b407ed2140c53ecd7b71c4473b6390c93bb1b467584d411626bd50d7066c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\773b407ed2140c53ecd7b71c4473b6390c93bb1b467584d411626bd50d7066c2.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2352
-