Analysis
-
max time kernel
179s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 07:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5c951eb26d153da2f7cafdabb0f4ef3d.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
5c951eb26d153da2f7cafdabb0f4ef3d.dll
-
Size
360KB
-
MD5
5c951eb26d153da2f7cafdabb0f4ef3d
-
SHA1
656f22564ec3d99af5a7e3795b9dbb6eb39dbf29
-
SHA256
35b42a29aa8c8b380bbf0764e381caafe535453f6997fc6be170751af23c1920
-
SHA512
b3808dea83357077f9ca237ceb186abe063bd024e8c239004da918b454b83f9c29e7c68bd9dd6dc288fe493ddc547246ca89248bcc9a220bfa13074dec703f7b
-
SSDEEP
3072:o6pU5Y1DXnbMn7Uzkop61/dAzV2O3XwTBftrm2YedGf3QKZDE:o6C5AXbMn7UI1FoV2gwTBlrIckPi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3296 3840 rundll32.exe 82 PID 3840 wrote to memory of 3296 3840 rundll32.exe 82 PID 3840 wrote to memory of 3296 3840 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c951eb26d153da2f7cafdabb0f4ef3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c951eb26d153da2f7cafdabb0f4ef3d.dll,#12⤵PID:3296
-