Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 15:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
034dcf3eae831d7b6ff47a015533c05f.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
034dcf3eae831d7b6ff47a015533c05f.dll
-
Size
239KB
-
MD5
034dcf3eae831d7b6ff47a015533c05f
-
SHA1
f43620ee0419f85de4587a13321f40c2120128f0
-
SHA256
34c87cd5440425f461158ff0303406865d0cc31e9ad8c20e136f2ac75a6e247a
-
SHA512
9df6af13c3d44fa9413543dcc22dd969ec3164f040265a6278161628f7f140d9968c0e059040c702e43600b9d9830b2a8875da230510e640d6850485aafd035c
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0j:jDgtfRQUHPw06MoV2nwTBlhm87
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1220 4772 rundll32.exe 14 PID 4772 wrote to memory of 1220 4772 rundll32.exe 14 PID 4772 wrote to memory of 1220 4772 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\034dcf3eae831d7b6ff47a015533c05f.dll,#11⤵PID:1220
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\034dcf3eae831d7b6ff47a015533c05f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4772