Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
514faa8ad10855eba25cd61010030f4e.dll
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
514faa8ad10855eba25cd61010030f4e.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
514faa8ad10855eba25cd61010030f4e.dll
-
Size
810KB
-
MD5
514faa8ad10855eba25cd61010030f4e
-
SHA1
798139c14216420ff74bcd999b7b24703ff58f29
-
SHA256
a81463d45c2a272a6d1f7c19931e3622f4a0afbe467aff74e31bd5587a5ec1c3
-
SHA512
4116dc98682cd035f57e904cf893fc89c1da082dfdd69d4e552000f8ddb67cf8ecc9e31f411f5ad7fc4c5e2bae39c2f6ab79b1cd1f38f52aa39a16d88d428690
-
SSDEEP
12288:VHmV6t8f0rM7/H1DVhwTsCSS0PUv5QqSYOvJ2YK/o1V9PNrfeHZHIrzu:VulfFLVDVhdcgYOvUYK/o1NrfVu
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 2964 4844 rundll32.exe 70 PID 4844 wrote to memory of 2964 4844 rundll32.exe 70 PID 4844 wrote to memory of 2964 4844 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\514faa8ad10855eba25cd61010030f4e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\514faa8ad10855eba25cd61010030f4e.dll,#12⤵PID:2964
-