Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 06:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d17c86a6fa2a9b4e919e3e185940756.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d17c86a6fa2a9b4e919e3e185940756.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
0d17c86a6fa2a9b4e919e3e185940756.dll
-
Size
128KB
-
MD5
0d17c86a6fa2a9b4e919e3e185940756
-
SHA1
c08c642b282b668d83249aaae6346aca8a467027
-
SHA256
4ca7358b1159735474f553c793beb65a2045271a6c75ed77c5acdcefe64ab6f6
-
SHA512
fa9093a52ad14cdcf4ea64189a28a1a2c2a318c7e35a5dc33d27222465e7d4b9b66de8341e266c7760c25daa5f4d9f815dc593c96c0aa3f659b0fea1fde08c6c
-
SSDEEP
1536:/ZqVCMu69kUPjOaLkySFv1/9L5Q5FH7Ow0lPdxxgPdJ8srdhH48HUlqim3o0UfL:/LMv/PjOaLkjt/u2xgPd93ULm3o0KL
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1272 1316 rundll32.exe 14 PID 1316 wrote to memory of 1272 1316 rundll32.exe 14 PID 1316 wrote to memory of 1272 1316 rundll32.exe 14 PID 1316 wrote to memory of 1272 1316 rundll32.exe 14 PID 1316 wrote to memory of 1272 1316 rundll32.exe 14 PID 1316 wrote to memory of 1272 1316 rundll32.exe 14 PID 1316 wrote to memory of 1272 1316 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d17c86a6fa2a9b4e919e3e185940756.dll,#11⤵PID:1272
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d17c86a6fa2a9b4e919e3e185940756.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316