Analysis
-
max time kernel
149s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 04:42
Behavioral task
behavioral1
Sample
f47791a5919796a013d9bf397fe622c4444d7afa06d770bc4e162bc06fc6bd43.dll
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f47791a5919796a013d9bf397fe622c4444d7afa06d770bc4e162bc06fc6bd43.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
f47791a5919796a013d9bf397fe622c4444d7afa06d770bc4e162bc06fc6bd43.dll
-
Size
899KB
-
MD5
20463145df2f848a3b52f34ea26f6d12
-
SHA1
b8a52f47313c983773ffd9b8658d29a8147269b1
-
SHA256
f47791a5919796a013d9bf397fe622c4444d7afa06d770bc4e162bc06fc6bd43
-
SHA512
07b7f988d28bbcf34cf471a698fdb2a4cebb272c24625262ada8ec4bfa7366cba479c197c426ef98623eb0832bc6aa1de3e83d9c6036a8f18157ab0ccd23100c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXW:7wqd87VW
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4852 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 4852 116 rundll32.exe 85 PID 116 wrote to memory of 4852 116 rundll32.exe 85 PID 116 wrote to memory of 4852 116 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47791a5919796a013d9bf397fe622c4444d7afa06d770bc4e162bc06fc6bd43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47791a5919796a013d9bf397fe622c4444d7afa06d770bc4e162bc06fc6bd43.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4852
-