Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 19:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b42eeb5432b985ff8bc2e88ad64c1cd0.dll
Resource
win7-20231023-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
b42eeb5432b985ff8bc2e88ad64c1cd0.dll
Resource
win10v2004-20231023-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
b42eeb5432b985ff8bc2e88ad64c1cd0.dll
-
Size
5KB
-
MD5
b42eeb5432b985ff8bc2e88ad64c1cd0
-
SHA1
c0644f33bb83be554786df690fd26cae294e1b56
-
SHA256
8219b766c183a655589b01cfa3990bccbeee7911969f53f9457ea8186585be63
-
SHA512
14dd79e843055579a30487d2aa6aad00e9ab46d2e453e236c46f99e8a771644256fe49b44fc94642feb21b2b8f78f11292a4f84c36dd405185e0282bffdb5525
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHh3V7GPQ14FAMFSyBkeIanS4smeWc:nEY2RrF1eqwi49V7GzO6FIFvA4
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4528 4188 rundll32.exe 83 PID 4188 wrote to memory of 4528 4188 rundll32.exe 83 PID 4188 wrote to memory of 4528 4188 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b42eeb5432b985ff8bc2e88ad64c1cd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b42eeb5432b985ff8bc2e88ad64c1cd0.dll,#12⤵PID:4528
-