Analysis
-
max time kernel
143s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 11:30
Behavioral task
behavioral1
Sample
b3c55e5318e064a7ae1e83334985e80d826476d114a0019bd771987bc640fd29.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b3c55e5318e064a7ae1e83334985e80d826476d114a0019bd771987bc640fd29.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
b3c55e5318e064a7ae1e83334985e80d826476d114a0019bd771987bc640fd29.dll
-
Size
899KB
-
MD5
78b8d8ff591ace19990ed7738a067a83
-
SHA1
a593692868cb9accb68a4f7ee7b4b909e6ea597f
-
SHA256
b3c55e5318e064a7ae1e83334985e80d826476d114a0019bd771987bc640fd29
-
SHA512
a8ce6d76c8e5f9a22c1c70e7b2b98b2e1083cf99eb2648b36859f056b04e5a50db0730856f80d88f44c7c689facfae69c9b1a20ec6c5a7dcde32fe5a5e1c98e6
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXM:7wqd87VM
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1036 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1036 2172 rundll32.exe 89 PID 2172 wrote to memory of 1036 2172 rundll32.exe 89 PID 2172 wrote to memory of 1036 2172 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3c55e5318e064a7ae1e83334985e80d826476d114a0019bd771987bc640fd29.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3c55e5318e064a7ae1e83334985e80d826476d114a0019bd771987bc640fd29.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1036
-