Analysis
-
max time kernel
141s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 09:09
Behavioral task
behavioral1
Sample
4278cd90d8f27f87e76b93673bc9205973502cbc5d77934430148573b70c6ef9.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4278cd90d8f27f87e76b93673bc9205973502cbc5d77934430148573b70c6ef9.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
4278cd90d8f27f87e76b93673bc9205973502cbc5d77934430148573b70c6ef9.dll
-
Size
899KB
-
MD5
25aa799056dab79b4e39d978ca5274f9
-
SHA1
d01a3364a5b09c645ddf20fbc21c4570be757524
-
SHA256
4278cd90d8f27f87e76b93673bc9205973502cbc5d77934430148573b70c6ef9
-
SHA512
3992d8c66ae90b51aa056e1d4356e4c2255c3e2bfdbb5ab5342c4942d5d3fc4b99cdd894c70c8802cb8e022fab8a2d63e22c06ad63770ec09ca170173eaeaefa
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXj:7wqd87Vj
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4712 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4712 3620 rundll32.exe 87 PID 3620 wrote to memory of 4712 3620 rundll32.exe 87 PID 3620 wrote to memory of 4712 3620 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4278cd90d8f27f87e76b93673bc9205973502cbc5d77934430148573b70c6ef9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4278cd90d8f27f87e76b93673bc9205973502cbc5d77934430148573b70c6ef9.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4712
-