Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 13:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72d1c01040410b12778ff0e39932ca58.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
72d1c01040410b12778ff0e39932ca58.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
72d1c01040410b12778ff0e39932ca58.dll
-
Size
73KB
-
MD5
72d1c01040410b12778ff0e39932ca58
-
SHA1
26d1dcd1da7d74c91fcc145322721f308f808ac4
-
SHA256
846cb04b6271802996ee76defee7e2a6306cce2c45d6281264a2839398aac735
-
SHA512
9e9a3fb00a1aeaba0c9e50ccb021fbd7a8454b25f58f088eae94fce3440532e1bcd7551552d445ce1075965611783f74dcbc95a20094335fe0b43f3e863da931
-
SSDEEP
1536:i6t9nGaYzrmdiWfUGncq4ozlyXOe6j+L9c98Nnita8HUyf7rwtg:i6r+6BUxq4ozlyee669/tArwtg
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 4452 3008 rundll32.exe 14 PID 3008 wrote to memory of 4452 3008 rundll32.exe 14 PID 3008 wrote to memory of 4452 3008 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72d1c01040410b12778ff0e39932ca58.dll,#11⤵PID:4452
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72d1c01040410b12778ff0e39932ca58.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008