Analysis
-
max time kernel
148s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 21:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c7f5e7958238fa32563ea9743fa34f0.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c7f5e7958238fa32563ea9743fa34f0.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
4c7f5e7958238fa32563ea9743fa34f0.dll
-
Size
224KB
-
MD5
4c7f5e7958238fa32563ea9743fa34f0
-
SHA1
582e37603a11b0935e60d2f6ee97f683414aaeb9
-
SHA256
c86b69834529b89d955f9819382dd22ebcee3cc4e2b88427ef326c2e2a2aefe2
-
SHA512
da1f72e365da7c78a09932a114a4b324a987a76b75823046f8a9de7d075faabf2b4c65504a59f16e49248773d4962901f82fe040be44a98d62cee61f01feca2d
-
SSDEEP
3072:nW5QdQ/VDIHdhgFbrb9UBgyvLQlTbs6Ok5xJbM+ovYt4cCwX0tTmw0:W53VDI9NWO0cu5xq+w9HN0
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3672 3460 rundll32.exe 14 PID 3460 wrote to memory of 3672 3460 rundll32.exe 14 PID 3460 wrote to memory of 3672 3460 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c7f5e7958238fa32563ea9743fa34f0.dll,#11⤵PID:3672
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c7f5e7958238fa32563ea9743fa34f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3460