Analysis
-
max time kernel
91s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 09:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f8b4dca0a9586e60c7e1c39dc1cd28e.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f8b4dca0a9586e60c7e1c39dc1cd28e.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
7f8b4dca0a9586e60c7e1c39dc1cd28e.dll
-
Size
8KB
-
MD5
7f8b4dca0a9586e60c7e1c39dc1cd28e
-
SHA1
580a8c71c4be5bb00e6ae403ac6e108bce214157
-
SHA256
370e4b7629bf28de8725dd11a5a8cac3e2b80108bed5230c948c93bdc2e97fdf
-
SHA512
60f12337366122a70cac93e83e75f737649bc571332375384a5e99aa6ce049a6ea99676900ef3e4dfcc9f52fb916a79715822185a59424b47dc6df091e4a5442
-
SSDEEP
192:/DRauHtm6beDEISvjux9m3y03ql8U50VEFJwn/xfwJ0kgUw9D:/PHY6KYISyq3WlvTJEpfwJLU
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3236 2108 rundll32.exe 24 PID 2108 wrote to memory of 3236 2108 rundll32.exe 24 PID 2108 wrote to memory of 3236 2108 rundll32.exe 24
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f8b4dca0a9586e60c7e1c39dc1cd28e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f8b4dca0a9586e60c7e1c39dc1cd28e.dll,#12⤵PID:3236
-