Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2024 08:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5c951eb26d153da2f7cafdabb0f4ef3d.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
5c951eb26d153da2f7cafdabb0f4ef3d.dll
-
Size
360KB
-
MD5
5c951eb26d153da2f7cafdabb0f4ef3d
-
SHA1
656f22564ec3d99af5a7e3795b9dbb6eb39dbf29
-
SHA256
35b42a29aa8c8b380bbf0764e381caafe535453f6997fc6be170751af23c1920
-
SHA512
b3808dea83357077f9ca237ceb186abe063bd024e8c239004da918b454b83f9c29e7c68bd9dd6dc288fe493ddc547246ca89248bcc9a220bfa13074dec703f7b
-
SSDEEP
3072:o6pU5Y1DXnbMn7Uzkop61/dAzV2O3XwTBftrm2YedGf3QKZDE:o6C5AXbMn7UI1FoV2gwTBlrIckPi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 1424 4548 rundll32.exe 85 PID 4548 wrote to memory of 1424 4548 rundll32.exe 85 PID 4548 wrote to memory of 1424 4548 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c951eb26d153da2f7cafdabb0f4ef3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c951eb26d153da2f7cafdabb0f4ef3d.dll,#12⤵PID:1424
-