Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 22:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fc9c000e54f1785afa0127ce841b2c79.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fc9c000e54f1785afa0127ce841b2c79.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
fc9c000e54f1785afa0127ce841b2c79.dll
-
Size
3KB
-
MD5
fc9c000e54f1785afa0127ce841b2c79
-
SHA1
6997e8243fc93f6db5bb5fd028b6fdd1ef96fd8e
-
SHA256
35da0d2765c067022d0d1b7ad6b87330b6e8266ed4ede97cd512d8701b0594f3
-
SHA512
68278761ffb6b1dd5151077242144147f96d550b1624a6cd07bfb554500155f4fa955dfc8525f53f8f1603c098a796df008bff206a5fb96a4081919a06c9827b
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2336 2820 rundll32.exe 80 PID 2820 wrote to memory of 2336 2820 rundll32.exe 80 PID 2820 wrote to memory of 2336 2820 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc9c000e54f1785afa0127ce841b2c79.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc9c000e54f1785afa0127ce841b2c79.dll,#12⤵PID:2336
-