Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 16:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
56f9a983bfdce6994316262f2237d754.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
56f9a983bfdce6994316262f2237d754.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
56f9a983bfdce6994316262f2237d754.dll
-
Size
20KB
-
MD5
56f9a983bfdce6994316262f2237d754
-
SHA1
1e300703ea85f8dfc49059a0a29ce489d7cd0905
-
SHA256
2c5a4e37dcb436f740e88de7957756f323850ff91407e5c32f62916f0b3318dd
-
SHA512
5eccc0fae0160cf9315c2a2232eae8057786da34e103e62590e2c4aeba93375b3a2f124f48a4815f77ec8b2c125de983d07b707f1800cc6b095b6dfd1ebfb07a
-
SSDEEP
192:l2SALZC8eQ3ukfY53t19ThXOPByWRtMJ6mNjRusAfQZ+OhiJzodE7:l2JCbkfIH9T0pMJ6mDuc+MiJzod
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 5064 4952 rundll32.exe 24 PID 4952 wrote to memory of 5064 4952 rundll32.exe 24 PID 4952 wrote to memory of 5064 4952 rundll32.exe 24
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56f9a983bfdce6994316262f2237d754.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56f9a983bfdce6994316262f2237d754.dll,#12⤵PID:5064
-