Analysis
-
max time kernel
153s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
50b0f9eccf40bb25e0ec2772d2d524940b5b4400d3114ed1f1aefe4c5ba2f5a3.dll
Resource
win7-20230831-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
50b0f9eccf40bb25e0ec2772d2d524940b5b4400d3114ed1f1aefe4c5ba2f5a3.dll
Resource
win10v2004-20230915-en
1 signatures
150 seconds
General
-
Target
50b0f9eccf40bb25e0ec2772d2d524940b5b4400d3114ed1f1aefe4c5ba2f5a3.dll
-
Size
2.0MB
-
MD5
2bd0456faf784165ae295511366daedb
-
SHA1
1356d33a4b8da6e1dbb203bd009907edbd0e5dd4
-
SHA256
50b0f9eccf40bb25e0ec2772d2d524940b5b4400d3114ed1f1aefe4c5ba2f5a3
-
SHA512
45543853c68cc5b416b06119c16a2c171dddcdeec3ec1c48b0be77c897fcc05eafa505030ef68e291085371a2330aa60d2b8b5b4d099dadf4fc87427a09e5ce9
-
SSDEEP
49152:F0bxVqH+t6rw7AQ9R2SKFlk2Y/gCXPvxzO:F03si+k9RKFlAa
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4916 3208 rundll32.exe 84 PID 3208 wrote to memory of 4916 3208 rundll32.exe 84 PID 3208 wrote to memory of 4916 3208 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50b0f9eccf40bb25e0ec2772d2d524940b5b4400d3114ed1f1aefe4c5ba2f5a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50b0f9eccf40bb25e0ec2772d2d524940b5b4400d3114ed1f1aefe4c5ba2f5a3.dll,#12⤵PID:4916
-