Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 20:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
034dcf3eae831d7b6ff47a015533c05f.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
034dcf3eae831d7b6ff47a015533c05f.dll
-
Size
239KB
-
MD5
034dcf3eae831d7b6ff47a015533c05f
-
SHA1
f43620ee0419f85de4587a13321f40c2120128f0
-
SHA256
34c87cd5440425f461158ff0303406865d0cc31e9ad8c20e136f2ac75a6e247a
-
SHA512
9df6af13c3d44fa9413543dcc22dd969ec3164f040265a6278161628f7f140d9968c0e059040c702e43600b9d9830b2a8875da230510e640d6850485aafd035c
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0j:jDgtfRQUHPw06MoV2nwTBlhm87
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 1120 4468 rundll32.exe 88 PID 4468 wrote to memory of 1120 4468 rundll32.exe 88 PID 4468 wrote to memory of 1120 4468 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\034dcf3eae831d7b6ff47a015533c05f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\034dcf3eae831d7b6ff47a015533c05f.dll,#12⤵PID:1120
-