Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 01:03
Behavioral task
behavioral1
Sample
5578e95ebf7f0f26c8d526bf8145afb812f9b364e304a66ded87b49eb274e106.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5578e95ebf7f0f26c8d526bf8145afb812f9b364e304a66ded87b49eb274e106.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
5578e95ebf7f0f26c8d526bf8145afb812f9b364e304a66ded87b49eb274e106.dll
-
Size
899KB
-
MD5
c021b8eb8f705659ace0abfabb26e753
-
SHA1
96d4becf5a35679ded95e39d9f32e436ac6d1eb9
-
SHA256
5578e95ebf7f0f26c8d526bf8145afb812f9b364e304a66ded87b49eb274e106
-
SHA512
ff8860b3597c26e97ad1896fa84ae1a1d0f042ac17a68212f117b2f061119e43f306403ca7d4dfb791cc93aaa62b771c4f321f30189341622f6131ded6154ba1
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXs:7wqd87Vs
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4848 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4848 4348 rundll32.exe 83 PID 4348 wrote to memory of 4848 4348 rundll32.exe 83 PID 4348 wrote to memory of 4848 4348 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5578e95ebf7f0f26c8d526bf8145afb812f9b364e304a66ded87b49eb274e106.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5578e95ebf7f0f26c8d526bf8145afb812f9b364e304a66ded87b49eb274e106.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4848
-