Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 10:39
Behavioral task
behavioral1
Sample
a974428d1062aac17ff6b901bd4a617ee1c939b37fd06f6f13a397010553ac24.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a974428d1062aac17ff6b901bd4a617ee1c939b37fd06f6f13a397010553ac24.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
a974428d1062aac17ff6b901bd4a617ee1c939b37fd06f6f13a397010553ac24.dll
-
Size
50KB
-
MD5
065917570144b4b627588b96991e1260
-
SHA1
70c71add9737f6b74a2e40769c72f93e5b61f281
-
SHA256
a974428d1062aac17ff6b901bd4a617ee1c939b37fd06f6f13a397010553ac24
-
SHA512
d2dcca0cbec237e0bbeb7a1e1aec201f261eb125e05a4060289c429672435292c6cd6d65c8b6693ba8fe11be4207b157f8ae4ba1f78d3f89313ff5fcde667454
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o59JYH:W5ReWjTrW9rNPgYoLJYH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3048 2148 rundll32.exe 28 PID 2148 wrote to memory of 3048 2148 rundll32.exe 28 PID 2148 wrote to memory of 3048 2148 rundll32.exe 28 PID 2148 wrote to memory of 3048 2148 rundll32.exe 28 PID 2148 wrote to memory of 3048 2148 rundll32.exe 28 PID 2148 wrote to memory of 3048 2148 rundll32.exe 28 PID 2148 wrote to memory of 3048 2148 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a974428d1062aac17ff6b901bd4a617ee1c939b37fd06f6f13a397010553ac24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a974428d1062aac17ff6b901bd4a617ee1c939b37fd06f6f13a397010553ac24.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3048
-