Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 07:03
Behavioral task
behavioral1
Sample
8416c4aa4f031c89230be246b33a9611578cadf0a62a033fc6b28b1384c3de5c.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8416c4aa4f031c89230be246b33a9611578cadf0a62a033fc6b28b1384c3de5c.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
8416c4aa4f031c89230be246b33a9611578cadf0a62a033fc6b28b1384c3de5c.dll
-
Size
51KB
-
MD5
b361fea67c2c9e125c34cf64bc44b53b
-
SHA1
e52526a14fae69502c21c3f19c078eab4a7dfb1a
-
SHA256
8416c4aa4f031c89230be246b33a9611578cadf0a62a033fc6b28b1384c3de5c
-
SHA512
aa69c755d5e19536008dba7229ca5113411537862c559a8b6ec29c211e1c1e27ab676d50ae2d067977a269b9161b267dda4e1a8ae348b6f60a34356d103d270a
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLrJYH5:1dWubF3n9S91BF3fboXJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4160 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4160 1088 rundll32.exe 85 PID 1088 wrote to memory of 4160 1088 rundll32.exe 85 PID 1088 wrote to memory of 4160 1088 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8416c4aa4f031c89230be246b33a9611578cadf0a62a033fc6b28b1384c3de5c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8416c4aa4f031c89230be246b33a9611578cadf0a62a033fc6b28b1384c3de5c.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4160
-