Analysis
-
max time kernel
142s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 00:06
Behavioral task
behavioral1
Sample
7212fa96b6379ecb4946d00720e5c079472b9f939eb2fa90b8a32465ef5219fe.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7212fa96b6379ecb4946d00720e5c079472b9f939eb2fa90b8a32465ef5219fe.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
7212fa96b6379ecb4946d00720e5c079472b9f939eb2fa90b8a32465ef5219fe.dll
-
Size
899KB
-
MD5
2673f2947f7cfa1e59213699bfeef8f1
-
SHA1
f8f838e74bc05a97f4568ecdeacc4cf5e392841d
-
SHA256
7212fa96b6379ecb4946d00720e5c079472b9f939eb2fa90b8a32465ef5219fe
-
SHA512
5d05eaebf005549620b4f017169ca234e10f57734e3380ef41b3023bffe5dfff71f26b6f04cfc782b8ddcdabcd9b74dc5773107c4c5e153cae1f0398c3eb877d
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXB:7wqd87VB
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2288 1920 rundll32.exe 84 PID 1920 wrote to memory of 2288 1920 rundll32.exe 84 PID 1920 wrote to memory of 2288 1920 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7212fa96b6379ecb4946d00720e5c079472b9f939eb2fa90b8a32465ef5219fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7212fa96b6379ecb4946d00720e5c079472b9f939eb2fa90b8a32465ef5219fe.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2288
-