Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 19:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
705e5891c31d42801237ef13b44dc7ba.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
705e5891c31d42801237ef13b44dc7ba.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
705e5891c31d42801237ef13b44dc7ba.dll
-
Size
17KB
-
MD5
705e5891c31d42801237ef13b44dc7ba
-
SHA1
8a60fec491586194cff4e57f74f62781dc2adca3
-
SHA256
16aa571eba527ad984196f5e35e47092612ed9bb00ab12e9e55402970e3a171b
-
SHA512
a75f880da9cec198a5e0b67340d3a2be4a23c3a364c75e81284a7f5c041bd4c7fd8323c004c43c3de5adf2c3dc6a062b6a4e53c4a755aca229f7ac3b0210779e
-
SSDEEP
384:Z5mRHplfn6sbITjw5Bktbr+YUjbDTRpJAGNt:ZmnV5etbd4RpJh
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 5004 3420 rundll32.exe 85 PID 3420 wrote to memory of 5004 3420 rundll32.exe 85 PID 3420 wrote to memory of 5004 3420 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\705e5891c31d42801237ef13b44dc7ba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\705e5891c31d42801237ef13b44dc7ba.dll,#12⤵PID:5004
-