Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 15:46
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1354813.2224.24199.dll
Resource
win7-20230220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1354813.2224.24199.dll
Resource
win10v2004-20230221-en
1 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Heuristic.HEUR.AGEN.1354813.2224.24199.dll
-
Size
682KB
-
MD5
027264f63967cc689de35c34b3720cba
-
SHA1
d3e053437ea8488bdfc2517fd51e22c0b64199bb
-
SHA256
7f0c64d88ed943e27084c9650d96b5a69e5bd19f50abd5fa68d662711909f3e1
-
SHA512
7b53d6cff091ac16e149af20f2d58ef61dab791ebafe602f76fe354bae2566c4780ec71517f9f13f07a44ba27891f697d669900954915e91e1c2b643f8981fe9
-
SSDEEP
6144:LetGBPI0cVlvTDduu2usSanT9TUboMMMJFusO3/KbL:L+8fgLhtxsP3/U
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3732 2068 rundll32.exe 82 PID 2068 wrote to memory of 3732 2068 rundll32.exe 82 PID 2068 wrote to memory of 3732 2068 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1354813.2224.24199.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1354813.2224.24199.dll,#12⤵PID:3732
-