Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
0481a685d2b037100f3090e96653012b.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0481a685d2b037100f3090e96653012b.dll
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
0481a685d2b037100f3090e96653012b.dll
-
Size
31KB
-
MD5
0481a685d2b037100f3090e96653012b
-
SHA1
5a3b5f4d604390db1b037971843a95d75fe1d972
-
SHA256
1250d406fdd3a348320407bade6c9ec449abef73792fc7815029b689557ee227
-
SHA512
95cca5315ed36836a168d97b78ed4614d006d3256783f3476001f36ce52c82a71f7b7b44b600bbeed4795e6e2c426cf0fb478bb0f8796bc19534aa21aa1ca677
-
SSDEEP
768:2o46l1Q2GkgTdNPFHDofb4gYh/4za6LHz:yc1p8HSkPhWzz
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2400 1636 rundll32.exe 66 PID 1636 wrote to memory of 2400 1636 rundll32.exe 66 PID 1636 wrote to memory of 2400 1636 rundll32.exe 66
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0481a685d2b037100f3090e96653012b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0481a685d2b037100f3090e96653012b.dll,#12⤵PID:2400
-