Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 20:35
Behavioral task
behavioral1
Sample
076172a4e7b79413c505987ab6b8eeac2cb789641d7da648006d635dd7f15c98.dll
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
076172a4e7b79413c505987ab6b8eeac2cb789641d7da648006d635dd7f15c98.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
076172a4e7b79413c505987ab6b8eeac2cb789641d7da648006d635dd7f15c98.dll
-
Size
51KB
-
MD5
eef7f3dcc2c5ad80797b8ad1eb7f6a5d
-
SHA1
0fc76c104f93bb2106b1157447a52328d6d8fde0
-
SHA256
076172a4e7b79413c505987ab6b8eeac2cb789641d7da648006d635dd7f15c98
-
SHA512
09748b9b2d23239dda03d52e28add07b2e9f86a20419c3b131776b104c646db3f7f5585a70e7852a92d6aa9a8156a2fce95f0a49e929bd6fe434d68c0d688980
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLcJYH5:1dWubF3n9S91BF3fbooJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2204 1724 rundll32.exe 28 PID 1724 wrote to memory of 2204 1724 rundll32.exe 28 PID 1724 wrote to memory of 2204 1724 rundll32.exe 28 PID 1724 wrote to memory of 2204 1724 rundll32.exe 28 PID 1724 wrote to memory of 2204 1724 rundll32.exe 28 PID 1724 wrote to memory of 2204 1724 rundll32.exe 28 PID 1724 wrote to memory of 2204 1724 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\076172a4e7b79413c505987ab6b8eeac2cb789641d7da648006d635dd7f15c98.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\076172a4e7b79413c505987ab6b8eeac2cb789641d7da648006d635dd7f15c98.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2204
-