Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 04:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
47fcbf6121cacaef216baa230b054b15.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
47fcbf6121cacaef216baa230b054b15.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
47fcbf6121cacaef216baa230b054b15.dll
-
Size
224KB
-
MD5
47fcbf6121cacaef216baa230b054b15
-
SHA1
6a5c17cbb74ba5e8d594e6875e94ab1e7253b648
-
SHA256
cf25137be13df6a89f80c5db2238818254d756b866692c1a882304b43c63a5eb
-
SHA512
cafec0019ceddcc2f680bdce9f78e91af3d6354a4f6a7145b5a679664e6a2da444d477fe4ea1b7755f29e562401319c7913f5d46dbbc3c5c04558ee8680bc3a6
-
SSDEEP
6144:P+1/hQJ7hocruDvmb2A38gvqaqFztilOl1elpQxlSUApM1aYiDmzxF:6VlSbPDmv
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4756 3188 rundll32.exe 38 PID 3188 wrote to memory of 4756 3188 rundll32.exe 38 PID 3188 wrote to memory of 4756 3188 rundll32.exe 38
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47fcbf6121cacaef216baa230b054b15.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47fcbf6121cacaef216baa230b054b15.dll,#12⤵PID:4756
-