Analysis
-
max time kernel
154s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 19:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
443f40949da1f25867d12dbee9802e9b.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
443f40949da1f25867d12dbee9802e9b.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
443f40949da1f25867d12dbee9802e9b.dll
-
Size
28KB
-
MD5
443f40949da1f25867d12dbee9802e9b
-
SHA1
b4d0bbc2a70d174f629ff4e418243c7d54f4babf
-
SHA256
57e5cd6c937d2e44f7c7ae718e34c774255add6640b2cf2f8737e5d59aa09c23
-
SHA512
008caa98bbb693cf6e970179e719a30268f73fbceed56542636f611571925b8f661d6fb8d8c7aeecf4b4c87f3c4f93222e231b7ec690267067e0abee796f03e0
-
SSDEEP
384:7rYx1Vx98FnuEGrFYB5ud+mSYAQ+TQHg9Npct5J6fnKxn:PyV98WrFM5uo1vQHg7at5kfnKx
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4508 4460 rundll32.exe 87 PID 4460 wrote to memory of 4508 4460 rundll32.exe 87 PID 4460 wrote to memory of 4508 4460 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\443f40949da1f25867d12dbee9802e9b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\443f40949da1f25867d12dbee9802e9b.dll,#12⤵PID:4508
-