Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 04:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
549caeae8232756e9636f35b77227d8f.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
549caeae8232756e9636f35b77227d8f.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
549caeae8232756e9636f35b77227d8f.dll
-
Size
3KB
-
MD5
549caeae8232756e9636f35b77227d8f
-
SHA1
28235e027d3231e104e3c627d21f121ce4e944b0
-
SHA256
14cb549d7653d934048dfcc7edfba1469d65519ebcec2f6c8ac7357efac31130
-
SHA512
5b1b9399d31c509be3954720e913b0509e1f3683c54e4588dc8e7676f4280723201e5b0df2a22155c005a9e3a55473ddffa298371fcd342fa41abda4532ac11e
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1692 2348 rundll32.exe 51 PID 2348 wrote to memory of 1692 2348 rundll32.exe 51 PID 2348 wrote to memory of 1692 2348 rundll32.exe 51
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\549caeae8232756e9636f35b77227d8f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\549caeae8232756e9636f35b77227d8f.dll,#12⤵PID:1692
-