Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1d74cab53b1590e60800b36cb44ed6d7.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d74cab53b1590e60800b36cb44ed6d7.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
1d74cab53b1590e60800b36cb44ed6d7.dll
-
Size
3KB
-
MD5
1d74cab53b1590e60800b36cb44ed6d7
-
SHA1
7a04d887a6501689dae3c573bae6a15e11c03955
-
SHA256
23a90307503f2082a1e4f96050ba4b0e268dfcb90b79f458a2a33c318f22aef1
-
SHA512
7a55274041790c0e0636e447e5907bb2ed99defc7652f5c8fd3fc72a661b0ad122a90d1d6a85892e85f43d2307198fe84d0fa4d7c9f580769ca80a523dc9ce87
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3464 5116 rundll32.exe 14 PID 5116 wrote to memory of 3464 5116 rundll32.exe 14 PID 5116 wrote to memory of 3464 5116 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d74cab53b1590e60800b36cb44ed6d7.dll,#11⤵PID:3464
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d74cab53b1590e60800b36cb44ed6d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5116