Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 07:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c47b4d9fd8f039edc1c885ce07d4b18.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c47b4d9fd8f039edc1c885ce07d4b18.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
3c47b4d9fd8f039edc1c885ce07d4b18.dll
-
Size
32KB
-
MD5
3c47b4d9fd8f039edc1c885ce07d4b18
-
SHA1
a8299669bf49f6d7120ff73d1eabb11fc2260c7b
-
SHA256
d6e6ce0ef4626f6b7f9f4a644f259ee8bd84fb6ec536d1f4c23fa94cb5454793
-
SHA512
c3ca4d8e7c396b322aa8c9a2e43b688cf4366e751ce686ab299015b35b00d9b6d6c8e0ceab9a21dea59d074b0b66ec76ab82befb49a5bbf284b2af5744981998
-
SSDEEP
384:Eopf1ZC9c9ovkDnmFnK2eYpHfC78pxZs772qm+HoLq00dO0Baw7JFJ5CRkEn0C8:EUf3GvbnneYpq74s70VqboShVDMRk60d
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2464 1680 rundll32.exe 16 PID 1680 wrote to memory of 2464 1680 rundll32.exe 16 PID 1680 wrote to memory of 2464 1680 rundll32.exe 16 PID 1680 wrote to memory of 2464 1680 rundll32.exe 16 PID 1680 wrote to memory of 2464 1680 rundll32.exe 16 PID 1680 wrote to memory of 2464 1680 rundll32.exe 16 PID 1680 wrote to memory of 2464 1680 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c47b4d9fd8f039edc1c885ce07d4b18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c47b4d9fd8f039edc1c885ce07d4b18.dll,#12⤵PID:2464
-