Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 02:53
Behavioral task
behavioral1
Sample
82dece5832b1c1035d600ec86c11ddc9780939c318655ce5ef14e4f6e14f8e0f.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
82dece5832b1c1035d600ec86c11ddc9780939c318655ce5ef14e4f6e14f8e0f.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
82dece5832b1c1035d600ec86c11ddc9780939c318655ce5ef14e4f6e14f8e0f.dll
-
Size
51KB
-
MD5
90ef79b590535cf5bd1de2fe59bc983a
-
SHA1
08dc1a3f8d4826e71ebac35b19bf94eb8bdad017
-
SHA256
82dece5832b1c1035d600ec86c11ddc9780939c318655ce5ef14e4f6e14f8e0f
-
SHA512
09bb5918d0e6415779cab084fec541170e002d91d3dde69919f524eeac4649ed28b2859c7a027e3606a1464713c44ea1f973fec9916d160d3ba915b795942ff6
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLcJYH5:1dWubF3n9S91BF3fboQJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3952 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3952 4312 rundll32.exe 84 PID 4312 wrote to memory of 3952 4312 rundll32.exe 84 PID 4312 wrote to memory of 3952 4312 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82dece5832b1c1035d600ec86c11ddc9780939c318655ce5ef14e4f6e14f8e0f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82dece5832b1c1035d600ec86c11ddc9780939c318655ce5ef14e4f6e14f8e0f.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3952
-