Analysis
-
max time kernel
148s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 00:19
Behavioral task
behavioral1
Sample
303ee01f6fa52825c2af6493a609c3b71f88a90f3595c25293491c1ec5514573.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
303ee01f6fa52825c2af6493a609c3b71f88a90f3595c25293491c1ec5514573.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
303ee01f6fa52825c2af6493a609c3b71f88a90f3595c25293491c1ec5514573.dll
-
Size
50KB
-
MD5
1be3fc5bc4f6ceeeba3266d5d35c81c2
-
SHA1
aab7095b9442728525a16bcac17dc19fd27572e9
-
SHA256
303ee01f6fa52825c2af6493a609c3b71f88a90f3595c25293491c1ec5514573
-
SHA512
f0f162a30dc1383691883dcd1b0cbff48d850eaec99a4bf8cb5521511984583f7c5889eabd201a5f8e1fcb350e9de4e0c1163cab24175315a2692444fb600de1
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5GJYH:W5ReWjTrW9rNPgYowJYH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3332 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3332 2552 rundll32.exe 84 PID 2552 wrote to memory of 3332 2552 rundll32.exe 84 PID 2552 wrote to memory of 3332 2552 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\303ee01f6fa52825c2af6493a609c3b71f88a90f3595c25293491c1ec5514573.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\303ee01f6fa52825c2af6493a609c3b71f88a90f3595c25293491c1ec5514573.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3332
-