Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 21:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72e92edf7bf193cb20d5f14079fdc4d9.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
72e92edf7bf193cb20d5f14079fdc4d9.dll
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
72e92edf7bf193cb20d5f14079fdc4d9.dll
-
Size
362KB
-
MD5
72e92edf7bf193cb20d5f14079fdc4d9
-
SHA1
5f3db6e6ed910a8f0d1e526d0636ec774dd53d69
-
SHA256
7ad8fdb33454ab54155e2ad663c4467b67a52dd49975419e02b8e128a4ef2747
-
SHA512
b99059322c0b76e651ac58715ab7736228f81a0f8d0ae1a21efcdfa59ea6a5274e24d2dca96bec95d36811914b0592796d14c5e026938c1b8c852752279f01a0
-
SSDEEP
6144:sX1qQRVmfcLYgIawIK4RtAgW/YxbzoH/Evf0DjQifvBgwMlgjS7XYN+LWQW1Hm5f:I1hRIfkYgu14RwmzoLDjTfvuxlgjMX6y
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1192 2300 rundll32.exe 84 PID 2300 wrote to memory of 1192 2300 rundll32.exe 84 PID 2300 wrote to memory of 1192 2300 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72e92edf7bf193cb20d5f14079fdc4d9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72e92edf7bf193cb20d5f14079fdc4d9.dll,#12⤵PID:1192
-