Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 23:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07bf9d1a6fd7e9d606733069743cefcc.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
07bf9d1a6fd7e9d606733069743cefcc.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
07bf9d1a6fd7e9d606733069743cefcc.dll
-
Size
522KB
-
MD5
07bf9d1a6fd7e9d606733069743cefcc
-
SHA1
d3e85b69021ed79efdacda216f394f05de3e30b4
-
SHA256
88e4a1148abc3e1b76cbc1100bc5fd37c06758618497aa06b425e0c9d6b043a2
-
SHA512
0a85c49e1f14c800f1e08df37404e66d4d3fdba792354f61550f48f93a3bd4acd81f2471c608a11354502157c1793ac42c4c9ac1274c0244bb4ef337cbf48f06
-
SSDEEP
1536:gwzq8krJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJv:gwu88
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1220 wrote to memory of 3868 1220 rundll32.exe 16 PID 1220 wrote to memory of 3868 1220 rundll32.exe 16 PID 1220 wrote to memory of 3868 1220 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07bf9d1a6fd7e9d606733069743cefcc.dll,#11⤵PID:3868
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07bf9d1a6fd7e9d606733069743cefcc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1220