Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:40
Static task
static1
Behavioral task
behavioral1
Sample
1262bf8ff46fb32887ca7702bfe28f19.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1262bf8ff46fb32887ca7702bfe28f19.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1262bf8ff46fb32887ca7702bfe28f19.dll
-
Size
767KB
-
MD5
1262bf8ff46fb32887ca7702bfe28f19
-
SHA1
c403f690ed699c9a8000e482f7419730c04df082
-
SHA256
9ae4357858e2862820d643ffa1f1f97c045a292e00eebe9843904c22ff8f445b
-
SHA512
138cfe1bea841ffa59a81ab904fd475ffd9c0811405db83345443b2152af8c4fd26c834092bebfc1e9a355115b4ee1953ad4613ddefe8da9179aa60c13925bd1
-
SSDEEP
12288:vO6WXE6UyQYu0PoPOaVqNNXMaApJlOTQ2tiCZXfK8h9SlqFLpX:vOCjGSOaMXXMJPuXfK8hwcFLpX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2348 4636 rundll32.exe 16 PID 4636 wrote to memory of 2348 4636 rundll32.exe 16 PID 4636 wrote to memory of 2348 4636 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1262bf8ff46fb32887ca7702bfe28f19.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1262bf8ff46fb32887ca7702bfe28f19.dll,#12⤵PID:2348
-