Analysis
-
max time kernel
146s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 22:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15361b0f8483a8c2d679a7a7599f9032.dll
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
15361b0f8483a8c2d679a7a7599f9032.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
15361b0f8483a8c2d679a7a7599f9032.dll
-
Size
3KB
-
MD5
15361b0f8483a8c2d679a7a7599f9032
-
SHA1
343d56607cfb5a1243800cb7e147d2b27d218c82
-
SHA256
3dfe4918bb26777311937dd1542030bdaa11bc326a092d55863265e8e2615fcf
-
SHA512
0407a89c2def2ebe26f0c61bb8d15b773f072e475487a5ebea2ef0a81ee2c34623b3ad44dbdc3bae219a055975d79407eeec0c1a454605a3917090cf5b9a5452
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1544 1144 rundll32.exe 16 PID 1144 wrote to memory of 1544 1144 rundll32.exe 16 PID 1144 wrote to memory of 1544 1144 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15361b0f8483a8c2d679a7a7599f9032.dll,#11⤵PID:1544
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15361b0f8483a8c2d679a7a7599f9032.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1144